SlideShare a Scribd company logo
1 of 34
THE STATE OF CYBER SECURITY:
AND WHAT WE MIGHT DO ABOUT IT
Jane Frankland, hello@cybersecuritycapital.com
Copyright CS^
Agenda
• I’m going to talk about:
• The state of the industry and 3 current emerging trends
• The significance of women in relation to these
• What changes we need to make so our industry becomes
stronger
• My objective is to:
• Share some insights and stories so lessons may be learnt
• Inspire and empower you
• Get a commitment from you
Who am I?
• Jane Frankland -
entrepreneur, speaker,
consultant and author
• SC Magazine Awards Judge
(Europe)
• Board Advisor for ClubCISO
• Cyber Security Woman of
the Year 2016 (nominee)
• Mum to 3 kids
We’re losing the cyber war
• Alex Dewedney, Director of Cyber Security at CESG
admits at RSA Con that we’re losing the war against
cybercrime despite throwing money at the problem.
• “We can point to lots of achievements around
understanding the threats much better, about taking
steps to mitigate those threats, addressing the national
skills base and so on but, nationally, we are not winning
the fight on cyber security,”
3trends
1. Cybercrime is increasing
• Lloyd’s of London estimates that cyber attacks will cost
businesses as much as $400B a year (includes direct
damage plus post-attack disruption to the normal
course of business).
• Juniper research predicts that the rapid digitization of
consumers’ lives and enterprise records will increase
the cost of breaches to $2.1T globally by 2019.
• The World Economic Forum says a significant portion
of cybercrime goes undetected (e.g. industrial
espionage where access to confidential documents and
data is difficult to spot).
• Panda Labs estimates that 40% of all computers in
certain countries — including China, Ecuador and
Turkey — are now infected with some type of malware.
2. The skills gap is widening
According to Cisco there 1M global cyber security job
openings. Demand is expected to rise to 6M globally by
2019, with a projected shortfall of 1.5M.
3. The way we work is changing
THE ROLE OF WOMEN
HOW CAN WOMEN HELP TO IMPROVE THE CRISIS
WE HAVE ON OUR HANDS?
Economics
• McKinsey & Co. reported that full gender
equality would add 26%, or $28T, to
global gross domestic product by 2025.
• Productive, innovative and able to stay
on schedule and within budget,
compared to homogenous teams.
• When women are in leadership roles,
there’s more diversity in the workforce,
contributions to charities and support of
local businesses.
• When women are politically and
economically empowered societies are
more stable.
Cyber Security
• Women think differently to men.
• We’re genetically programmed to be risk
averse (due to our ability to give birth) and
therefore seek security.
• When men and women work together in
cyber security we can do a better job of
protecting our environments and thwarting
attacks.
Women have played crucial roles in
computing from the start
• 1840s Ada Lovelace (the first
programmer) created an algorithm that
the first modern computer (the
Analytical Engine) used.
• 1940s - During WW II, women at
Bletchley Park were instrumental in
breaking code.
• At this time too, women programmed
the US Army's Electronic Numerical
Integrator And Computer (ENIAC) - the
first electronic general-purpose
computer.
• 1950s Grace Hopper came up with the
first computer compiler and then
established the programming language
COBOL. Mary Keller helped develop
BASIC and Radia Perlman built some of
the protocols of the early Internet. Elsie
Shutt founded one of the first US
software businesses, Comp Inc, and Dina
St Johnston founded the first British
software company, VPS.
• In the 1960s Dame Steve Shirley started
a software company called Freelance
Programmers.
In 1967, Cosmopolitan Magazine wrote an article called The Computer
Girls, which proclaimed: “Now have come the big, dazzling computers
– and a whole new kind of work for women: programming.”
All time highs: the 1980s
• Women in computing were at an all time high of 38%
and in security we were well and truly on a roll. We had
women like Becky Bace, known informally as the
‘mother of computer security’ directing research in
information security for the U.S. Department of Defence
and teaching the first generations of cyber security
professionals.
All time lows: today
5 CHALLENGES TO ADDRESS
IN ORDER TO IMPROVE THE NUMBERS OF WOMEN IN
CYBER SECURITY & THE STATE OF OUR INDUSTRY
CHALLENGE ONE
We need to get better at developing
and attracting talent.
In schools
• Despite technology forming such an integral aspect of our working
lives, even in 2016 girls still don’t get as much opportunity to use
computers in schools as boys. Ignorance, stereotypes and biased
approaches still exist.
• Raytheon and the National Cybersecurity Alliance surveyed the
career interests and educational preparedness of millennials (ages
18 to 26) in 12 countries around the world, 62% of men and 75% of
women said no secondary or high school computer classes offered
the skills to help them pursue a career in cyber security.
• STORY - ANJA
In universities
Universities are not adequately preparing students for the
cyber security workplace.
From elsewhere
CHALLENGE TWO
We need to get better at marketing
and communications.
Understand our buyers’ needs
Candidates (diversity)
Vendors/
Consultancies/
StartupsCISOs
3 STAKEHOLDERS
IBM: HackAHairDryer
CHALLENGE THREE
We need to define the industry and
showcase the variety of roles.
STORY - TOM
Resources
Community & knowledge share
The Book The Conference
CHALLENGE FOUR
We need to improve our
recruitment processes.
Recruitmen
t agencies
Recruitment
Agencies
Human
Resources
Competance
versus
Confidence
CHALLENGE FIVE
We need to offer workplace
flexibility and recalibrate culture.
Gen Ys (1981-95) will make up 50% of the workforce in 4 years & 75% in 9
years and they’re the largest generation (75M) after the Baby Boomers (80M).
WHERE DO WE GO
FROM HERE?
VISIT CS^
http://cybersecuritycapital.com

More Related Content

What's hot

Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)Ashley Sumrall
 
Bill Gates
Bill GatesBill Gates
Bill Gatesangilyu
 
Biography of Bill Gates
Biography of Bill GatesBiography of Bill Gates
Biography of Bill GatesVijay Goti
 
Bill gates leadership
Bill gates leadershipBill gates leadership
Bill gates leadershipMehak Kapoor
 
Bill Gates BioGraphy
Bill Gates BioGraphyBill Gates BioGraphy
Bill Gates BioGraphyBhavesh Patel
 
CSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering WomenCSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering WomenAtefeh Riazi
 
Your career beyond the hype
Your career beyond the hypeYour career beyond the hype
Your career beyond the hypeCILIP
 
The Digital Divide Orange
The Digital Divide   OrangeThe Digital Divide   Orange
The Digital Divide Orangerobny73
 
Women in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapWomen in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapRebecca Ralston
 
Information technology
Information technologyInformation technology
Information technologyJiffin George
 
AESC: Social Networks Are Creating Risks for Boards
AESC:  Social Networks Are Creating Risks for BoardsAESC:  Social Networks Are Creating Risks for Boards
AESC: Social Networks Are Creating Risks for BoardsOpenMatters
 

What's hot (18)

Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
bill gates
bill gatesbill gates
bill gates
 
Bill gates
Bill gatesBill gates
Bill gates
 
Biography of Bill Gates
Biography of Bill GatesBiography of Bill Gates
Biography of Bill Gates
 
Bill gates leadership
Bill gates leadershipBill gates leadership
Bill gates leadership
 
Bill Gates BioGraphy
Bill Gates BioGraphyBill Gates BioGraphy
Bill Gates BioGraphy
 
Bill gates biography
Bill gates biographyBill gates biography
Bill gates biography
 
Women in Technology
Women in TechnologyWomen in Technology
Women in Technology
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
CSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering WomenCSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering Women
 
Your career beyond the hype
Your career beyond the hypeYour career beyond the hype
Your career beyond the hype
 
Project on bill gates
Project on bill gatesProject on bill gates
Project on bill gates
 
The Digital Divide Orange
The Digital Divide   OrangeThe Digital Divide   Orange
The Digital Divide Orange
 
Women in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapWomen in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender Gap
 
Information technology
Information technologyInformation technology
Information technology
 
AESC: Social Networks Are Creating Risks for Boards
AESC:  Social Networks Are Creating Risks for BoardsAESC:  Social Networks Are Creating Risks for Boards
AESC: Social Networks Are Creating Risks for Boards
 

Viewers also liked

자료구조 Project1
자료구조 Project1자료구조 Project1
자료구조 Project1KoChungWook
 
이산치수학 Project7
이산치수학 Project7이산치수학 Project7
이산치수학 Project7KoChungWook
 
자료구조 Project4
자료구조 Project4자료구조 Project4
자료구조 Project4KoChungWook
 
"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentation"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentationdogtipper
 
Equations & Expressions Sub Unit B
Equations & Expressions Sub Unit BEquations & Expressions Sub Unit B
Equations & Expressions Sub Unit Bmrsfrasure
 
Activitat 11
Activitat 11Activitat 11
Activitat 11jgalan33
 
Presentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuisPresentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuisrenskepat
 
Activitat 11
Activitat 11Activitat 11
Activitat 11jgalan33
 
Geometry Unit Slideshow
Geometry Unit SlideshowGeometry Unit Slideshow
Geometry Unit Slideshowmrsfrasure
 
Activitat 11
Activitat 11Activitat 11
Activitat 11jgalan33
 
Story board
Story boardStory board
Story board10ggo
 
Social Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time TalkSocial Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time TalkJane Frankland
 
数学之美与浪潮之巅
数学之美与浪潮之巅数学之美与浪潮之巅
数学之美与浪潮之巅wangqunbaidu
 
이산치수학 Project6
이산치수학 Project6이산치수학 Project6
이산치수학 Project6KoChungWook
 
이산치수학 Project5
이산치수학 Project5이산치수학 Project5
이산치수학 Project5KoChungWook
 
Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)Jane Frankland
 
이산치수학 Project3
이산치수학 Project3이산치수학 Project3
이산치수학 Project3KoChungWook
 
Universidad fermín toro diapositivas
Universidad fermín toro diapositivasUniversidad fermín toro diapositivas
Universidad fermín toro diapositivasJOSEYENIBORGES
 
Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2Taufik Setiawan
 

Viewers also liked (20)

자료구조 Project1
자료구조 Project1자료구조 Project1
자료구조 Project1
 
이산치수학 Project7
이산치수학 Project7이산치수학 Project7
이산치수학 Project7
 
자료구조 Project4
자료구조 Project4자료구조 Project4
자료구조 Project4
 
"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentation"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentation
 
Equations & Expressions Sub Unit B
Equations & Expressions Sub Unit BEquations & Expressions Sub Unit B
Equations & Expressions Sub Unit B
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Presentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuisPresentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuis
 
Klik today
Klik todayKlik today
Klik today
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Geometry Unit Slideshow
Geometry Unit SlideshowGeometry Unit Slideshow
Geometry Unit Slideshow
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Story board
Story boardStory board
Story board
 
Social Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time TalkSocial Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time Talk
 
数学之美与浪潮之巅
数学之美与浪潮之巅数学之美与浪潮之巅
数学之美与浪潮之巅
 
이산치수학 Project6
이산치수학 Project6이산치수학 Project6
이산치수학 Project6
 
이산치수학 Project5
이산치수학 Project5이산치수학 Project5
이산치수학 Project5
 
Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)
 
이산치수학 Project3
이산치수학 Project3이산치수학 Project3
이산치수학 Project3
 
Universidad fermín toro diapositivas
Universidad fermín toro diapositivasUniversidad fermín toro diapositivas
Universidad fermín toro diapositivas
 
Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2
 

Similar to The State Of Cyber Security & What We Might Do About It

Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Deanna Kosaraju
 
CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?Tom Hood, CPA,CITP,CGMA
 
Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019John Ashcroft
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationCollabor8now Ltd
 
Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1Lori Jones
 
Presentatie 60-jaar NCD
Presentatie 60-jaar NCDPresentatie 60-jaar NCD
Presentatie 60-jaar NCDEdwin Korver
 
Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)Jane Frankland
 
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.Tonya Jackson
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Brad Deflin
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialMichael Netzley, Ph.D.
 
Social Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management ChallengeSocial Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management ChallengeLisa Chow
 
dynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdfdynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdfssuser0eb436
 
Social Media, an overview
Social Media, an overviewSocial Media, an overview
Social Media, an overviewRick Mans
 
Silvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender GapSilvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender GapOslo Business Region
 
SXSW, the famous digital festival.
SXSW, the famous digital festival. SXSW, the famous digital festival.
SXSW, the famous digital festival. BETC DIGITAL
 

Similar to The State Of Cyber Security & What We Might Do About It (20)

Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
 
Eap in 2028 – is employee assistance “tech proof”?
Eap in 2028 – is employee assistance “tech proof”?Eap in 2028 – is employee assistance “tech proof”?
Eap in 2028 – is employee assistance “tech proof”?
 
CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?
 
Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
 
Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1
 
Presentatie 60-jaar NCD
Presentatie 60-jaar NCDPresentatie 60-jaar NCD
Presentatie 60-jaar NCD
 
Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)
 
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
 
Afrofutures?
Afrofutures?Afrofutures?
Afrofutures?
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
Social Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management ChallengeSocial Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management Challenge
 
dynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdfdynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdf
 
Social Media, an overview
Social Media, an overviewSocial Media, an overview
Social Media, an overview
 
Leadership & Social Media NSAA
Leadership & Social Media   NSAALeadership & Social Media   NSAA
Leadership & Social Media NSAA
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Silvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender GapSilvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender Gap
 
SXSW, the famous digital festival.
SXSW, the famous digital festival. SXSW, the famous digital festival.
SXSW, the famous digital festival.
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

The State Of Cyber Security & What We Might Do About It

  • 1. THE STATE OF CYBER SECURITY: AND WHAT WE MIGHT DO ABOUT IT Jane Frankland, hello@cybersecuritycapital.com Copyright CS^
  • 2. Agenda • I’m going to talk about: • The state of the industry and 3 current emerging trends • The significance of women in relation to these • What changes we need to make so our industry becomes stronger • My objective is to: • Share some insights and stories so lessons may be learnt • Inspire and empower you • Get a commitment from you
  • 3. Who am I? • Jane Frankland - entrepreneur, speaker, consultant and author • SC Magazine Awards Judge (Europe) • Board Advisor for ClubCISO • Cyber Security Woman of the Year 2016 (nominee) • Mum to 3 kids
  • 4. We’re losing the cyber war • Alex Dewedney, Director of Cyber Security at CESG admits at RSA Con that we’re losing the war against cybercrime despite throwing money at the problem. • “We can point to lots of achievements around understanding the threats much better, about taking steps to mitigate those threats, addressing the national skills base and so on but, nationally, we are not winning the fight on cyber security,”
  • 6. 1. Cybercrime is increasing • Lloyd’s of London estimates that cyber attacks will cost businesses as much as $400B a year (includes direct damage plus post-attack disruption to the normal course of business). • Juniper research predicts that the rapid digitization of consumers’ lives and enterprise records will increase the cost of breaches to $2.1T globally by 2019. • The World Economic Forum says a significant portion of cybercrime goes undetected (e.g. industrial espionage where access to confidential documents and data is difficult to spot). • Panda Labs estimates that 40% of all computers in certain countries — including China, Ecuador and Turkey — are now infected with some type of malware.
  • 7. 2. The skills gap is widening According to Cisco there 1M global cyber security job openings. Demand is expected to rise to 6M globally by 2019, with a projected shortfall of 1.5M.
  • 8. 3. The way we work is changing
  • 9. THE ROLE OF WOMEN HOW CAN WOMEN HELP TO IMPROVE THE CRISIS WE HAVE ON OUR HANDS?
  • 10. Economics • McKinsey & Co. reported that full gender equality would add 26%, or $28T, to global gross domestic product by 2025. • Productive, innovative and able to stay on schedule and within budget, compared to homogenous teams. • When women are in leadership roles, there’s more diversity in the workforce, contributions to charities and support of local businesses. • When women are politically and economically empowered societies are more stable. Cyber Security • Women think differently to men. • We’re genetically programmed to be risk averse (due to our ability to give birth) and therefore seek security. • When men and women work together in cyber security we can do a better job of protecting our environments and thwarting attacks.
  • 11. Women have played crucial roles in computing from the start • 1840s Ada Lovelace (the first programmer) created an algorithm that the first modern computer (the Analytical Engine) used. • 1940s - During WW II, women at Bletchley Park were instrumental in breaking code. • At this time too, women programmed the US Army's Electronic Numerical Integrator And Computer (ENIAC) - the first electronic general-purpose computer. • 1950s Grace Hopper came up with the first computer compiler and then established the programming language COBOL. Mary Keller helped develop BASIC and Radia Perlman built some of the protocols of the early Internet. Elsie Shutt founded one of the first US software businesses, Comp Inc, and Dina St Johnston founded the first British software company, VPS. • In the 1960s Dame Steve Shirley started a software company called Freelance Programmers.
  • 12. In 1967, Cosmopolitan Magazine wrote an article called The Computer Girls, which proclaimed: “Now have come the big, dazzling computers – and a whole new kind of work for women: programming.”
  • 13. All time highs: the 1980s • Women in computing were at an all time high of 38% and in security we were well and truly on a roll. We had women like Becky Bace, known informally as the ‘mother of computer security’ directing research in information security for the U.S. Department of Defence and teaching the first generations of cyber security professionals.
  • 14. All time lows: today
  • 15. 5 CHALLENGES TO ADDRESS IN ORDER TO IMPROVE THE NUMBERS OF WOMEN IN CYBER SECURITY & THE STATE OF OUR INDUSTRY
  • 16. CHALLENGE ONE We need to get better at developing and attracting talent.
  • 17. In schools • Despite technology forming such an integral aspect of our working lives, even in 2016 girls still don’t get as much opportunity to use computers in schools as boys. Ignorance, stereotypes and biased approaches still exist. • Raytheon and the National Cybersecurity Alliance surveyed the career interests and educational preparedness of millennials (ages 18 to 26) in 12 countries around the world, 62% of men and 75% of women said no secondary or high school computer classes offered the skills to help them pursue a career in cyber security. • STORY - ANJA
  • 18. In universities Universities are not adequately preparing students for the cyber security workplace.
  • 20. CHALLENGE TWO We need to get better at marketing and communications.
  • 21. Understand our buyers’ needs Candidates (diversity) Vendors/ Consultancies/ StartupsCISOs 3 STAKEHOLDERS
  • 23. CHALLENGE THREE We need to define the industry and showcase the variety of roles.
  • 26. Community & knowledge share The Book The Conference
  • 27. CHALLENGE FOUR We need to improve our recruitment processes.
  • 29.
  • 30. CHALLENGE FIVE We need to offer workplace flexibility and recalibrate culture.
  • 31. Gen Ys (1981-95) will make up 50% of the workforce in 4 years & 75% in 9 years and they’re the largest generation (75M) after the Baby Boomers (80M).
  • 32. WHERE DO WE GO FROM HERE?
  • 33.