SlideShare a Scribd company logo
1 of 34
THE STATE OF CYBER SECURITY:
AND WHAT WE MIGHT DO ABOUT IT
Jane Frankland, hello@cybersecuritycapital.com
Copyright CS^
Agenda
• I’m going to talk about:
• The state of the industry and 3 current emerging trends
• The significance of women in relation to these
• What changes we need to make so our industry becomes
stronger
• My objective is to:
• Share some insights and stories so lessons may be learnt
• Inspire and empower you
• Get a commitment from you
Who am I?
• Jane Frankland -
entrepreneur, speaker,
consultant and author
• SC Magazine Awards Judge
(Europe)
• Board Advisor for ClubCISO
• Cyber Security Woman of
the Year 2016 (nominee)
• Mum to 3 kids
We’re losing the cyber war
• Alex Dewedney, Director of Cyber Security at CESG
admits at RSA Con that we’re losing the war against
cybercrime despite throwing money at the problem.
• “We can point to lots of achievements around
understanding the threats much better, about taking
steps to mitigate those threats, addressing the national
skills base and so on but, nationally, we are not winning
the fight on cyber security,”
3trends
1. Cybercrime is increasing
• Lloyd’s of London estimates that cyber attacks will cost
businesses as much as $400B a year (includes direct
damage plus post-attack disruption to the normal
course of business).
• Juniper research predicts that the rapid digitization of
consumers’ lives and enterprise records will increase
the cost of breaches to $2.1T globally by 2019.
• The World Economic Forum says a significant portion
of cybercrime goes undetected (e.g. industrial
espionage where access to confidential documents and
data is difficult to spot).
• Panda Labs estimates that 40% of all computers in
certain countries — including China, Ecuador and
Turkey — are now infected with some type of malware.
2. The skills gap is widening
According to Cisco there 1M global cyber security job
openings. Demand is expected to rise to 6M globally by
2019, with a projected shortfall of 1.5M.
3. The way we work is changing
THE ROLE OF WOMEN
HOW CAN WOMEN HELP TO IMPROVE THE CRISIS
WE HAVE ON OUR HANDS?
Economics
• McKinsey & Co. reported that full gender
equality would add 26%, or $28T, to
global gross domestic product by 2025.
• Productive, innovative and able to stay
on schedule and within budget,
compared to homogenous teams.
• When women are in leadership roles,
there’s more diversity in the workforce,
contributions to charities and support of
local businesses.
• When women are politically and
economically empowered societies are
more stable.
Cyber Security
• Women think differently to men.
• We’re genetically programmed to be risk
averse (due to our ability to give birth) and
therefore seek security.
• When men and women work together in
cyber security we can do a better job of
protecting our environments and thwarting
attacks.
Women have played crucial roles in
computing from the start
• 1840s Ada Lovelace (the first
programmer) created an algorithm that
the first modern computer (the
Analytical Engine) used.
• 1940s - During WW II, women at
Bletchley Park were instrumental in
breaking code.
• At this time too, women programmed
the US Army's Electronic Numerical
Integrator And Computer (ENIAC) - the
first electronic general-purpose
computer.
• 1950s Grace Hopper came up with the
first computer compiler and then
established the programming language
COBOL. Mary Keller helped develop
BASIC and Radia Perlman built some of
the protocols of the early Internet. Elsie
Shutt founded one of the first US
software businesses, Comp Inc, and Dina
St Johnston founded the first British
software company, VPS.
• In the 1960s Dame Steve Shirley started
a software company called Freelance
Programmers.
In 1967, Cosmopolitan Magazine wrote an article called The Computer
Girls, which proclaimed: “Now have come the big, dazzling computers
– and a whole new kind of work for women: programming.”
All time highs: the 1980s
• Women in computing were at an all time high of 38%
and in security we were well and truly on a roll. We had
women like Becky Bace, known informally as the
‘mother of computer security’ directing research in
information security for the U.S. Department of Defence
and teaching the first generations of cyber security
professionals.
All time lows: today
5 CHALLENGES TO ADDRESS
IN ORDER TO IMPROVE THE NUMBERS OF WOMEN IN
CYBER SECURITY & THE STATE OF OUR INDUSTRY
CHALLENGE ONE
We need to get better at developing
and attracting talent.
In schools
• Despite technology forming such an integral aspect of our working
lives, even in 2016 girls still don’t get as much opportunity to use
computers in schools as boys. Ignorance, stereotypes and biased
approaches still exist.
• Raytheon and the National Cybersecurity Alliance surveyed the
career interests and educational preparedness of millennials (ages
18 to 26) in 12 countries around the world, 62% of men and 75% of
women said no secondary or high school computer classes offered
the skills to help them pursue a career in cyber security.
• STORY - ANJA
In universities
Universities are not adequately preparing students for the
cyber security workplace.
From elsewhere
CHALLENGE TWO
We need to get better at marketing
and communications.
Understand our buyers’ needs
Candidates (diversity)
Vendors/
Consultancies/
StartupsCISOs
3 STAKEHOLDERS
IBM: HackAHairDryer
CHALLENGE THREE
We need to define the industry and
showcase the variety of roles.
STORY - TOM
Resources
Community & knowledge share
The Book The Conference
CHALLENGE FOUR
We need to improve our
recruitment processes.
Recruitmen
t agencies
Recruitment
Agencies
Human
Resources
Competance
versus
Confidence
CHALLENGE FIVE
We need to offer workplace
flexibility and recalibrate culture.
Gen Ys (1981-95) will make up 50% of the workforce in 4 years & 75% in 9
years and they’re the largest generation (75M) after the Baby Boomers (80M).
WHERE DO WE GO
FROM HERE?
VISIT CS^
http://cybersecuritycapital.com

More Related Content

What's hot

Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)
Ashley Sumrall
 
Bill gates leadership
Bill gates leadershipBill gates leadership
Bill gates leadership
Mehak Kapoor
 
The Digital Divide Orange
The Digital Divide   OrangeThe Digital Divide   Orange
The Digital Divide Orange
robny73
 
Information technology
Information technologyInformation technology
Information technology
Jiffin George
 

What's hot (18)

Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
bill gates
bill gatesbill gates
bill gates
 
Bill gates
Bill gatesBill gates
Bill gates
 
Biography of Bill Gates
Biography of Bill GatesBiography of Bill Gates
Biography of Bill Gates
 
Bill gates leadership
Bill gates leadershipBill gates leadership
Bill gates leadership
 
Bill Gates BioGraphy
Bill Gates BioGraphyBill Gates BioGraphy
Bill Gates BioGraphy
 
Bill gates biography
Bill gates biographyBill gates biography
Bill gates biography
 
Women in Technology
Women in TechnologyWomen in Technology
Women in Technology
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
CSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering WomenCSW60 The Role of Technology in Empowering Women
CSW60 The Role of Technology in Empowering Women
 
Your career beyond the hype
Your career beyond the hypeYour career beyond the hype
Your career beyond the hype
 
Project on bill gates
Project on bill gatesProject on bill gates
Project on bill gates
 
The Digital Divide Orange
The Digital Divide   OrangeThe Digital Divide   Orange
The Digital Divide Orange
 
Women in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapWomen in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender Gap
 
Information technology
Information technologyInformation technology
Information technology
 
AESC: Social Networks Are Creating Risks for Boards
AESC:  Social Networks Are Creating Risks for BoardsAESC:  Social Networks Are Creating Risks for Boards
AESC: Social Networks Are Creating Risks for Boards
 

Viewers also liked

자료구조 Project1
자료구조 Project1자료구조 Project1
자료구조 Project1
KoChungWook
 
이산치수학 Project7
이산치수학 Project7이산치수학 Project7
이산치수학 Project7
KoChungWook
 
자료구조 Project4
자료구조 Project4자료구조 Project4
자료구조 Project4
KoChungWook
 
Presentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuisPresentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuis
renskepat
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
jgalan33
 
数学之美与浪潮之巅
数学之美与浪潮之巅数学之美与浪潮之巅
数学之美与浪潮之巅
wangqunbaidu
 
이산치수학 Project6
이산치수학 Project6이산치수학 Project6
이산치수학 Project6
KoChungWook
 
이산치수학 Project5
이산치수학 Project5이산치수학 Project5
이산치수학 Project5
KoChungWook
 
이산치수학 Project3
이산치수학 Project3이산치수학 Project3
이산치수학 Project3
KoChungWook
 
Universidad fermín toro diapositivas
Universidad fermín toro diapositivasUniversidad fermín toro diapositivas
Universidad fermín toro diapositivas
JOSEYENIBORGES
 

Viewers also liked (20)

자료구조 Project1
자료구조 Project1자료구조 Project1
자료구조 Project1
 
이산치수학 Project7
이산치수학 Project7이산치수학 Project7
이산치수학 Project7
 
자료구조 Project4
자료구조 Project4자료구조 Project4
자료구조 Project4
 
"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentation"Getting Creative with Social Media" BlogPaws Presentation
"Getting Creative with Social Media" BlogPaws Presentation
 
Equations & Expressions Sub Unit B
Equations & Expressions Sub Unit BEquations & Expressions Sub Unit B
Equations & Expressions Sub Unit B
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Presentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuisPresentatie 26 juni 2012 boven ij ziekenhuis
Presentatie 26 juni 2012 boven ij ziekenhuis
 
Klik today
Klik todayKlik today
Klik today
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Geometry Unit Slideshow
Geometry Unit SlideshowGeometry Unit Slideshow
Geometry Unit Slideshow
 
Activitat 11
Activitat 11Activitat 11
Activitat 11
 
Story board
Story boardStory board
Story board
 
Social Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time TalkSocial Media to Enable Sales for Natwest Summer Time Talk
Social Media to Enable Sales for Natwest Summer Time Talk
 
数学之美与浪潮之巅
数学之美与浪潮之巅数学之美与浪潮之巅
数学之美与浪潮之巅
 
이산치수학 Project6
이산치수학 Project6이산치수학 Project6
이산치수학 Project6
 
이산치수학 Project5
이산치수학 Project5이산치수학 Project5
이산치수학 Project5
 
Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)Make It Happen - AWE Summitt 14 (Zurich)
Make It Happen - AWE Summitt 14 (Zurich)
 
이산치수학 Project3
이산치수학 Project3이산치수학 Project3
이산치수학 Project3
 
Universidad fermín toro diapositivas
Universidad fermín toro diapositivasUniversidad fermín toro diapositivas
Universidad fermín toro diapositivas
 
Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2Tugas praktik bahasa rakitan 2
Tugas praktik bahasa rakitan 2
 

Similar to The State Of Cyber Security & What We Might Do About It

Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Deanna Kosaraju
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
Collabor8now Ltd
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 

Similar to The State Of Cyber Security & What We Might Do About It (20)

Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
 
Eap in 2028 – is employee assistance “tech proof”?
Eap in 2028 – is employee assistance “tech proof”?Eap in 2028 – is employee assistance “tech proof”?
Eap in 2028 – is employee assistance “tech proof”?
 
CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?CPAs & Social Media - Passing Fad or Valuable Tool?
CPAs & Social Media - Passing Fad or Valuable Tool?
 
Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019Our Guide to Digital disruption Update 2019
Our Guide to Digital disruption Update 2019
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
 
Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1Higher Biology Essay Questions Unit 1
Higher Biology Essay Questions Unit 1
 
Presentatie 60-jaar NCD
Presentatie 60-jaar NCDPresentatie 60-jaar NCD
Presentatie 60-jaar NCD
 
Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)
 
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
Sunday In The Park Bel Kaufman Essay. Online assignment writing service.
 
Afrofutures?
Afrofutures?Afrofutures?
Afrofutures?
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
Social Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management ChallengeSocial Media in the Enterprise: Information Management Challenge
Social Media in the Enterprise: Information Management Challenge
 
dynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdfdynamo-smb-ebook-volume-2.pdf
dynamo-smb-ebook-volume-2.pdf
 
Social Media, an overview
Social Media, an overviewSocial Media, an overview
Social Media, an overview
 
Leadership & Social Media NSAA
Leadership & Social Media   NSAALeadership & Social Media   NSAA
Leadership & Social Media NSAA
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Silvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender GapSilvija Seres: The Epic Startup Gender Gap
Silvija Seres: The Epic Startup Gender Gap
 
SXSW, the famous digital festival.
SXSW, the famous digital festival. SXSW, the famous digital festival.
SXSW, the famous digital festival.
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

The State Of Cyber Security & What We Might Do About It

  • 1. THE STATE OF CYBER SECURITY: AND WHAT WE MIGHT DO ABOUT IT Jane Frankland, hello@cybersecuritycapital.com Copyright CS^
  • 2. Agenda • I’m going to talk about: • The state of the industry and 3 current emerging trends • The significance of women in relation to these • What changes we need to make so our industry becomes stronger • My objective is to: • Share some insights and stories so lessons may be learnt • Inspire and empower you • Get a commitment from you
  • 3. Who am I? • Jane Frankland - entrepreneur, speaker, consultant and author • SC Magazine Awards Judge (Europe) • Board Advisor for ClubCISO • Cyber Security Woman of the Year 2016 (nominee) • Mum to 3 kids
  • 4. We’re losing the cyber war • Alex Dewedney, Director of Cyber Security at CESG admits at RSA Con that we’re losing the war against cybercrime despite throwing money at the problem. • “We can point to lots of achievements around understanding the threats much better, about taking steps to mitigate those threats, addressing the national skills base and so on but, nationally, we are not winning the fight on cyber security,”
  • 6. 1. Cybercrime is increasing • Lloyd’s of London estimates that cyber attacks will cost businesses as much as $400B a year (includes direct damage plus post-attack disruption to the normal course of business). • Juniper research predicts that the rapid digitization of consumers’ lives and enterprise records will increase the cost of breaches to $2.1T globally by 2019. • The World Economic Forum says a significant portion of cybercrime goes undetected (e.g. industrial espionage where access to confidential documents and data is difficult to spot). • Panda Labs estimates that 40% of all computers in certain countries — including China, Ecuador and Turkey — are now infected with some type of malware.
  • 7. 2. The skills gap is widening According to Cisco there 1M global cyber security job openings. Demand is expected to rise to 6M globally by 2019, with a projected shortfall of 1.5M.
  • 8. 3. The way we work is changing
  • 9. THE ROLE OF WOMEN HOW CAN WOMEN HELP TO IMPROVE THE CRISIS WE HAVE ON OUR HANDS?
  • 10. Economics • McKinsey & Co. reported that full gender equality would add 26%, or $28T, to global gross domestic product by 2025. • Productive, innovative and able to stay on schedule and within budget, compared to homogenous teams. • When women are in leadership roles, there’s more diversity in the workforce, contributions to charities and support of local businesses. • When women are politically and economically empowered societies are more stable. Cyber Security • Women think differently to men. • We’re genetically programmed to be risk averse (due to our ability to give birth) and therefore seek security. • When men and women work together in cyber security we can do a better job of protecting our environments and thwarting attacks.
  • 11. Women have played crucial roles in computing from the start • 1840s Ada Lovelace (the first programmer) created an algorithm that the first modern computer (the Analytical Engine) used. • 1940s - During WW II, women at Bletchley Park were instrumental in breaking code. • At this time too, women programmed the US Army's Electronic Numerical Integrator And Computer (ENIAC) - the first electronic general-purpose computer. • 1950s Grace Hopper came up with the first computer compiler and then established the programming language COBOL. Mary Keller helped develop BASIC and Radia Perlman built some of the protocols of the early Internet. Elsie Shutt founded one of the first US software businesses, Comp Inc, and Dina St Johnston founded the first British software company, VPS. • In the 1960s Dame Steve Shirley started a software company called Freelance Programmers.
  • 12. In 1967, Cosmopolitan Magazine wrote an article called The Computer Girls, which proclaimed: “Now have come the big, dazzling computers – and a whole new kind of work for women: programming.”
  • 13. All time highs: the 1980s • Women in computing were at an all time high of 38% and in security we were well and truly on a roll. We had women like Becky Bace, known informally as the ‘mother of computer security’ directing research in information security for the U.S. Department of Defence and teaching the first generations of cyber security professionals.
  • 14. All time lows: today
  • 15. 5 CHALLENGES TO ADDRESS IN ORDER TO IMPROVE THE NUMBERS OF WOMEN IN CYBER SECURITY & THE STATE OF OUR INDUSTRY
  • 16. CHALLENGE ONE We need to get better at developing and attracting talent.
  • 17. In schools • Despite technology forming such an integral aspect of our working lives, even in 2016 girls still don’t get as much opportunity to use computers in schools as boys. Ignorance, stereotypes and biased approaches still exist. • Raytheon and the National Cybersecurity Alliance surveyed the career interests and educational preparedness of millennials (ages 18 to 26) in 12 countries around the world, 62% of men and 75% of women said no secondary or high school computer classes offered the skills to help them pursue a career in cyber security. • STORY - ANJA
  • 18. In universities Universities are not adequately preparing students for the cyber security workplace.
  • 20. CHALLENGE TWO We need to get better at marketing and communications.
  • 21. Understand our buyers’ needs Candidates (diversity) Vendors/ Consultancies/ StartupsCISOs 3 STAKEHOLDERS
  • 23. CHALLENGE THREE We need to define the industry and showcase the variety of roles.
  • 26. Community & knowledge share The Book The Conference
  • 27. CHALLENGE FOUR We need to improve our recruitment processes.
  • 29.
  • 30. CHALLENGE FIVE We need to offer workplace flexibility and recalibrate culture.
  • 31. Gen Ys (1981-95) will make up 50% of the workforce in 4 years & 75% in 9 years and they’re the largest generation (75M) after the Baby Boomers (80M).
  • 32. WHERE DO WE GO FROM HERE?
  • 33.