Home Education Code of conduct not just for women, but improves industry as a whole, says cyber security expert

Featured IT News

After Huawei, now German cars a threat to US national security

17 February 2019 in Government Tech Policy

When the US Government started going after Chinese telecommunications equipment vendor Huawei Technologies, it justified what it was doing by…

Former GCHQ chief slams bid for blanket ban on Chinese tech

17 February 2019 in Technology Regulation

A former director of Government Communications Headquarters, Britain's top spy agency, says statements that any Chinese technology in any part…

VIDEO: Samsung unveils Bixby 2.0 and DeX-enabled Galaxy Tab S5e, its new Android 9 tablet

16 February 2019 in Home Tech

Said to be "built for connectivity and entertainment", Samsung boasts its new Galaxy Tab S5e "packs smart features into a…

US bid to push Europe on Huawei ban meets resistance

15 February 2019 in Technology Regulation

The US is facing resistance from European countries it considers allies as it tries to convince them not to use…

Shebah raising $3m to fund ride-sharing service expansion

15 February 2019 in Market

Ride-sharing platform Shebah is turning to equity funding to raise up to $3 million to fund the next phase of…

Greens put boot into Labor for passing encryption law

15 February 2019 in Government Tech Policy

Australian Greens leader Senator Richard di Natale has laid into the Labor Party for letting the encryption law pass Parliament…

Senetas asks govt to repeal 'demonstrably flawed' encryption law

14 February 2019 in Government Tech Policy

Australian encryption technology company Senetas Corporation has called on the government to reconsider its encryption law, claiming that it is…

Michael Malone reappointed to NBN board

14 February 2019 in People Moves

Telecommunications and technology industry veteran Michael Malone has been re-appointed as a non-executive director of the board of NBN Co,…

Telstra profits drop by 28% as NBN continues to bite

14 February 2019 in Telecoms & NBN

Telstra has revealed a fall of 27.4% in its net profit after tax and a drop of 4.1% in its…

China says accusations over Australia hack 'a smear campaign'

14 February 2019 in Security

A Chinese Foreign Ministry spokesperson has described allegations that Beijing was behind a network intrusion of Australia's Federal Parliament as…

Higher salaries on offer from IT employers to attract top talent, says recruiter

14 February 2019 in Enterprise Staff

IT employers need to be willing to offer competitive remuneration packages in order to attract and retain the best talent…

MyNetFone Business partners with Australian Property Institute on tech initiative

14 February 2019 in Deals

MyNetFone Business, a provider of new-generation hosted communications services and part of the MNF Group, has partnered with property professionals…

Breaking IT News

LIVE STREAM: World Wide Web turns 30 on March 12 2019, Tim Berners-Lee to speak

17 February 2019 in Development

Tickets to the live London event featuring Sir Tim Berners-Lee and several speakers have long since sold out, with a…

Symantec Email Fraud Protection automates DMARC defence

15 February 2019 in Security

Symantec Email Fraud Protection is claimed to be designed to help organisations automatically prevent fraudulent emails from being delivered.

FBI evidence to remain in UK researcher's case

15 February 2019 in Security

A bid by British security researcher Marcus Hutchins, to get a court to ignore comments he made to FBI officials…

Google ramps up US data centre expansion

15 February 2019 in Strategy

Internet search giant Google is expanding its US data centre network, spending US$13 billion on new data centres and office…

Business case for 5G still unclear, survey finds

15 February 2019 in Telecoms & NBN

A survey of chief technology officers who are directly involved with 5G projects at 46 telcos around the globe indicates…

Square integrates with MYOB

15 February 2019 in Accounting Software

Payments provider Square has announced integration with MYOB's Essentials and AccountRight accounting systems.

DNS manipulation used to track Venezuelans who join in aid distribution

15 February 2019 in Security

A fake website, that is more or less an exact copy of one seeking humanitarian aid for Venezuela, has surfaced,…

China smartphone shipments down 10% in 2018

15 February 2019 in Mobile devices

Smartphone shipments in China fell 9.7% in the last quarter of 2018, falling to 103 million units, the technology analyst…

La Trobe business analytics students to receive SAS accreditation support

14 February 2019 in Education

La Trobe University has announced graduates of its Master of Business Analytics course will now qualify for assistance in internationally…

Brightcove to acquire Ooyala's online video business

14 February 2019 in Deals

Ooyala is selling its online video platform business to cloud video provider Brightcove.

Talend gains Garrow

14 February 2019 in People Moves

Cloud data integration specialist Talend has appointed Stu Garrow as its Singapore-based senior vice-president of sales and general manager for…

Tableau 2019.1 delivers major new features

14 February 2019 in Data

Analytics platform Tableau has delivered some major new features in its first update of the year.

VIDEOS: D-Link unveils new Omna Wire-Free cameras with impressive features

14 February 2019 in Home Tech

D-Link has unleashed its most advanced wire-free indoor and outdoor home surveillance kit, clearly designed to outdo competitors such as…

NBN affects Optus too, as profits fall

14 February 2019 in Telecoms & NBN

Australia's second largest telco Optus suffered a fall in net profit for its third quarter, with a fall of 32%…

Huawei tells partners ASPI 'spreading anti-China message'

14 February 2019 in Technology Regulation

The Australian arm of Chinese telecommunications equipment vendor Huawei Technologies has gone on the offensive against the lobby group, Australian…

D-Link goes wire-free for video surveillance

14 February 2019 in Home Tech

D-Link's new Omna indoor/outdoor video surveillance system uses wire-free HD cameras.

Telstra appoints Dutch veteran Blok as non-executive director

14 February 2019 in People Moves

The former chief executive of the Netherlands-based landline and mobile telecommunications company, KPN, Eelco Blok, has been appointed as a…

Talend partners with Australia’s PointsBet to deliver for punters

14 February 2019 in Deals

Global cloud data integration solutions provider Talend has partnered with Australian online bookmaker PointsBet to deliver what it claims is…

Cyber security entrepreneur and CISO adviser Jane Frankland wants to establish a code of conduct for conferences, saying advancing issues that promote women in IT will benefit the industry as a whole, irrespective of gender.

Frankland entered the industry 20 years ago as a young entrepreneur, launching her own business with a colleague. Back then, people “fell” into security, she says, and the role and the industry evolved alongside the person. Within five years the company was specialising in penetration testing, and she owned and ran this business for 16 years, before pausing for 18 months.

Yet, when Frankland returned to the security industry it wasn’t the same industry she knew. She picked up a 2015 ISC2 report and was immediately concerned by two figures: first, the low number of women in the industry in general, and secondly, the decline. In 2008 19% of security professionals were females, and this was down to 10% in 2015.

Frankland was so disturbed she felt compelled to write about it, describing her own experiences in the industry, and striving to promote the value of women in IT. She pressed ‘Post’ on LinkedIn and took her dog for a walk, concerned by the response she might receive, but recognising she needed to be brave and discuss the topic. Happily, the response was incredibly positive and even weeks and months later she was still receiving supportive feedback.

When returning to the industry, Frankland considered she didn’t simply want to run another penetration testing business, but could instead use her skills and experience in other ways to help entrepreneurs get their business off the ground, and to promote the industry in general, seeking ways to benefit it globally.

Consequently, she saw she could deliver value to the industry — to men and women alike — by expanding her article, adding guidelines, and interviewing others, and turning it into a book. She launched a KickStarter campaign and the book — “InSecurity - Why a failure to attract and retain women in cybersecurity is making us all less safe” — was fully-funded in five days, and subsequently published at the end of November 2017.

During her research, Frankland saw what she describes as “well-intentioned, but inadvertent” mistakes in the industry that ultimately worked against bringing women into IT in general, and security specifically.

An example is the language used in marketing roles and the messages sent out. Technology is no longer a hard-core technology field, she says, with many diverse roles and opportunities that span a rich set of skills and experiences. Instead of copying and pasting job specifications to replace roles, Frankland advocates they be written from the ground up, putting thought into what was the person who had this job like when they first came into it, rather than someone ready-made, and performing a better job of explaining the job specifications in gender-neutral language.

“Everyone is biased,” she says, “but we can all do something about it. Everyone can be empowered. Nobody has to be a victim. You can do something, you can take ownership."

Frankland also supports having appraisals and exit interviews to find out why people are leaving, and looking at culture and leadership, with the goal of making the environment best for everyone.

While Frankland says it is the lack of women in the industry which motivated her, her driver is ultimately to have systems and improvements in place which constrain bias and assumptions and attract the best and most suitable candidates for jobs, no matter if they are men or women.

She opposes what she describes as “an addiction to drama”, and is similarly concerned by people who would say “I’m a woman and it’s not fair".

In reality, she states, women do not want to be singled out, but simply wish to get on and do their job. Sometimes women are reluctant to get involved in certain, well-meaning initiatives to support women in technology because they do not wish to be differentiated. “If you are, then you are singled out and that can be divisive and make us vulnerable. It’s very tricky and complex.”

The Code of Conduct, Frankland’s current project, is shaped by this same thinking – making events a better environment for everyone, no matter gender or orientation or race or other factors.

This was occasioned by Frankland’s attendance at a UK InfoSec event where she came across the typical “booth babes” at an exhibitor stand, where models had been hired, dressed in red ball gowns. She sent a tweet to the event organisers to bring it to their attention, and both the organiser and exhibitor apologised and resolved the matter swiftly.

However, the story went to press, described as “Cyber firm blasted using booth babes” and received a flurry of attention. “I was trolled on Twitter for four days,” Frankland says. She received criticism as well as support, as did people contributing to the Twitter thread, with men and women attacking other men and women on all sides of the dialogue. “Some of the discussion got quite vicious and some people were suspended by Twitter.”

The explosion was surprising and shocking and once it settled down, Frankland turned her mind to what are the lessons, and how the industry could learn from this.

Following this event, Frankland reports a woman was groped at a security event by an influential man while he was under the influence of alcohol, and then further security events where again “booth babes” were employed.

The industry needed a code of conduct, she determined. While various conferences have published their own individual codes, Frankland could not see any that had a process, explaining, “here’s our commitment, what you can expect, if you have feedback regarding harassment or bullying here’s how you report it and how we will acknowledge and investigate it.”

None of this existed, so she set about to create it, providing a model code of conduct for the industry so event organisers can use it and provide a safe environment for attendees.

Already ISC2 has said it is behind the code, as has Cybersecurity Challenge in the UK.

Frankland is now working on her second book, “InPower,” looking at what it means to be in power in the industry.

She will be delivering a keynote speech at the AISA Cyber Conference in Melbourne, in October.

Returning to cyber security, she notes: “Our adversaries are not tied to regulations. They seek to fulfill their obligations which are usually stealing, manipulating or corrupting data. Our job is not the same as theirs. We have a very difficult job to do, and the industry can do a better job if it looks at things in a different way.”


With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.


Popular News




Sponsored News