Home Education Code of conduct not just for women, but improves industry as a whole, says cyber security expert

Featured IT News

From airlines to retail: after British Airways, Newegg breached

20 September 2018 in Security

The malicious attacker, or attackers, known as Magecart, who infiltrated the British Airways website last month, have now attacked online…

Fake CommBank, ANZ apps found on Google Play Store

20 September 2018 in Security

Fake apps for the Commonwealth Bank and ANZ are among a number of bogus Android applications attempting to represent six…

Toowoomba tower powers Telstra's world-first live 2Gbps LTE call

19 September 2018 in Telecoms & NBN

Telstra and its partners are claiming a world first for a successful 2Gbps capable LTE call on a commercial network.

Encryption bill endorsed by govt party room

19 September 2018 in Government Tech Policy

Barely one week of parliamentary sitting days after the date for comment ended, the Federal Government's party room has endorsed…

Citi analyst says Amazon should split to avoid anti-trust scrutiny

19 September 2018 in Cloud

An analyst from Citi Research has suggested that it might be a good idea for Amazon to split, separating its…

Telco industry leads battle against encryption bill

19 September 2018 in Government Tech Policy

The Communications Alliance, which represents the entire telecommunications industry in Australia, has signalled that it intends to lead a charge…

Chrome, Firefox will not trust Symantec SSL certs from next release

18 September 2018 in Security

In what is sure to cause concern at the the top levels of one of the leading security software vendors,…

TPG sees full-year profit fall as NBN continues to bite

18 September 2018 in Telecoms & NBN

TPG Telecom has reported a net profit after tax of $396.9 million for the year ending 31 July, a drop…

iOS 12, HomePod iOS 12, tvOS 12 and watchOS 5 now available for all to download

18 September 2018 in Home Tech

If you have a compatible iPhone, iPad, iPod touch, or Apple Watch, Apple TV or a HomePod, then today is…

ANZ Bank launches smartphone ATM access service

18 September 2018 in Market

Australia’s ANZ Bank has launched a smartphone ATM access service which allows customers to access cash on the go, using…

Indian paper creates confusion over Huawei's 5G role

18 September 2018 in Technology Regulation

An Indian newspaper's use of widely differing quotes in two separate stories has incorrectly given the impression that the Chinese…

Ex-Google man says asked to write software to censor news in 2006

18 September 2018 in Technology Regulation

A former software engineer at Google claims he was taken off a project to write code to censor news articles…

Breaking IT News

Six researchers boycott Dutch conf due to Palantir's sponsorship

20 September 2018 in Security

Two researchers from DATACTIVE, a University of Amsterdam project that examines the politics of big data, and four from the…

INDIGO cable first stage done with landing in Perth

20 September 2018 in Telecoms & NBN

The first section of the INDIGO subsea cable system has been completed with the landing of the INDIGO West cable…

Veritec wins contract to operate Microsoft Modernisation factory for government

20 September 2018 in Deals

Cloud solutions provider Veritec has secured a contract to operate Microsoft’s Modernisation Factory specifically for the Australian Government and critical…

FiberCorp claims fibre network to deliver Internet speeds 100 times faster than NBN

20 September 2018 in Internet of Things

Data centre provider FiberCorp is installing fibre technology across property developments in Sydney, Brisbane and Melbourne, claiming the delivery of…

Forcepoint brings 'defence-grade' cyber security to secure critical infrastructure and industrial control systems

19 September 2018 in Security

Forcepoint says its new Critical Infrastructure business unit will "address the challenge of balancing insider threat detection and data security…

Rackspace can be your organisation's Yoda, says general manager

19 September 2018 in Enterprise Cloud

Rackspace has the opportunity to be the leader in multi-cloud, as well as the number one managed cloud provider, the company's…

Data61, Hensoldt Cyber partner on cyber attack protection systems

19 September 2018 in Security

Data61, the CSIRO’s innovation network, has announced a global partnership with German cyber security company Hensoldt Cyber to collaborate on…

WA 3D metal printer maker turns out complex parts at market speed

19 September 2018 in Hardware

Western Australia-based 3D metal printer manufacturer Aurora Labs says it has reached the stage where it can print complex parts…

New Payments Platform to ‘transform’ customer experience for utilities: report

19 September 2018 in Market

The advent of Australia’s industry-wide New Payments Platform has opened the way for utilities companies to be able to deliver…

Extension for moving special business services to NBN opposed

19 September 2018 in Telecoms & NBN

Small broadband provider Aussie Broadband has voiced its opposition to a proposal to extend the disconnection date for special business…

Pegasus mobile spyware found in at least 45 countries: claim

19 September 2018 in Security

Canadian digital rights organisation The Citizen Lab claims to have found evidence that mobile spyware known as Pegasus, sold by…

Singtel achieves 1.5Gbps five-carrier aggregation LTE speed

19 September 2018 in Mobility

Singapore telco Singtel claims to achieved peak LTE speeds of 1.5Gbps using five-carrier aggregation in a lab environment, using a…

EU drops Ireland case after Apple pays back-taxes

19 September 2018 in Technology Regulation

The European Commission, the executive arm of the European Union, has said it will drop a case against Ireland, filed…

BigInsights Data & AI Innovation Awards Showcase – 28 September

18 September 2018 in Development

Learn about Innovating with Data & AI from Australia’s early adopters of technologies at the BigInsights Data and AI Innovation…

The future of data warehousing is data sharing, says Snowflake

18 September 2018 in Data

Cloud data warehouse vendor Snowflake says the future of data warehousing is data sharing between companies without moving the data,…

Telstra and Deloiite say '5G a $50b opportunity for Australian economy'

19 September 2018 in Telecoms & NBN

Deloitte's latest report finds two-thirds of businesses will be on 5G by 2020. It will be released at Telstra's annual…

VIDEO INTERVIEW: Workday's Tim Wakeford talks about the CFO's evolving role and strategic value-add

18 September 2018 in Business Software

Workday helps businesses with HR, Finance and HCM or 'Human Capital Management', and its vice-president of Financials Product Strategy, Tim…

IDC says SAS leads predictive analytics at twice market share of nearest competitor

18 September 2018 in Data

Global market intelligence advisory service IDC has released its findings on the worldwide big data and analytics software market share…

Cyber security entrepreneur and CISO adviser Jane Frankland wants to establish a code of conduct for conferences, saying advancing issues that promote women in IT will benefit the industry as a whole, irrespective of gender.

Frankland entered the industry 20 years ago as a young entrepreneur, launching her own business with a colleague. Back then, people “fell” into security, she says, and the role and the industry evolved alongside the person. Within five years the company was specialising in penetration testing, and she owned and ran this business for 16 years, before pausing for 18 months.

Yet, when Frankland returned to the security industry it wasn’t the same industry she knew. She picked up a 2015 ISC2 report and was immediately concerned by two figures: first, the low number of women in the industry in general, and secondly, the decline. In 2008 19% of security professionals were females, and this was down to 10% in 2015.

Frankland was so disturbed she felt compelled to write about it, describing her own experiences in the industry, and striving to promote the value of women in IT. She pressed ‘Post’ on LinkedIn and took her dog for a walk, concerned by the response she might receive, but recognising she needed to be brave and discuss the topic. Happily, the response was incredibly positive and even weeks and months later she was still receiving supportive feedback.

When returning to the industry, Frankland considered she didn’t simply want to run another penetration testing business, but could instead use her skills and experience in other ways to help entrepreneurs get their business off the ground, and to promote the industry in general, seeking ways to benefit it globally.

Consequently, she saw she could deliver value to the industry — to men and women alike — by expanding her article, adding guidelines, and interviewing others, and turning it into a book. She launched a KickStarter campaign and the book — “InSecurity - Why a failure to attract and retain women in cybersecurity is making us all less safe” — was fully-funded in five days, and subsequently published at the end of November 2017.

During her research, Frankland saw what she describes as “well-intentioned, but inadvertent” mistakes in the industry that ultimately worked against bringing women into IT in general, and security specifically.

An example is the language used in marketing roles and the messages sent out. Technology is no longer a hard-core technology field, she says, with many diverse roles and opportunities that span a rich set of skills and experiences. Instead of copying and pasting job specifications to replace roles, Frankland advocates they be written from the ground up, putting thought into what was the person who had this job like when they first came into it, rather than someone ready-made, and performing a better job of explaining the job specifications in gender-neutral language.

“Everyone is biased,” she says, “but we can all do something about it. Everyone can be empowered. Nobody has to be a victim. You can do something, you can take ownership."

Frankland also supports having appraisals and exit interviews to find out why people are leaving, and looking at culture and leadership, with the goal of making the environment best for everyone.

While Frankland says it is the lack of women in the industry which motivated her, her driver is ultimately to have systems and improvements in place which constrain bias and assumptions and attract the best and most suitable candidates for jobs, no matter if they are men or women.

She opposes what she describes as “an addiction to drama”, and is similarly concerned by people who would say “I’m a woman and it’s not fair".

In reality, she states, women do not want to be singled out, but simply wish to get on and do their job. Sometimes women are reluctant to get involved in certain, well-meaning initiatives to support women in technology because they do not wish to be differentiated. “If you are, then you are singled out and that can be divisive and make us vulnerable. It’s very tricky and complex.”

The Code of Conduct, Frankland’s current project, is shaped by this same thinking – making events a better environment for everyone, no matter gender or orientation or race or other factors.

This was occasioned by Frankland’s attendance at a UK InfoSec event where she came across the typical “booth babes” at an exhibitor stand, where models had been hired, dressed in red ball gowns. She sent a tweet to the event organisers to bring it to their attention, and both the organiser and exhibitor apologised and resolved the matter swiftly.

However, the story went to press, described as “Cyber firm blasted using booth babes” and received a flurry of attention. “I was trolled on Twitter for four days,” Frankland says. She received criticism as well as support, as did people contributing to the Twitter thread, with men and women attacking other men and women on all sides of the dialogue. “Some of the discussion got quite vicious and some people were suspended by Twitter.”

The explosion was surprising and shocking and once it settled down, Frankland turned her mind to what are the lessons, and how the industry could learn from this.

Following this event, Frankland reports a woman was groped at a security event by an influential man while he was under the influence of alcohol, and then further security events where again “booth babes” were employed.

The industry needed a code of conduct, she determined. While various conferences have published their own individual codes, Frankland could not see any that had a process, explaining, “here’s our commitment, what you can expect, if you have feedback regarding harassment or bullying here’s how you report it and how we will acknowledge and investigate it.”

None of this existed, so she set about to create it, providing a model code of conduct for the industry so event organisers can use it and provide a safe environment for attendees.

Already ISC2 has said it is behind the code, as has Cybersecurity Challenge in the UK.

Frankland is now working on her second book, “InPower,” looking at what it means to be in power in the industry.

She will be delivering a keynote speech at the AISA Cyber Conference in Melbourne, in October.

Returning to cyber security, she notes: “Our adversaries are not tied to regulations. They seek to fulfill their obligations which are usually stealing, manipulating or corrupting data. Our job is not the same as theirs. We have a very difficult job to do, and the industry can do a better job if it looks at things in a different way.”


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.


Popular News




Sponsored News