olume 2 ue 2 - ciso mag · 2019-10-07 · women. in our insight section, we have six women security...

10
CISO MAG | March 2018 1 Volume 2 | Issue 2 | March 2018 Moving the need e

Upload: others

Post on 31-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

CISO MAG | March 2018

Volume 2 | Issue 2

1PB

Volume 2 | Issue 2 | March 2018

Moving the

need e

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

32

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

54

INDEX

08BUZZThis Won’t Hurt for Long, but It’s for Your Own Good

16TABLE TALKTammy MoskitesManaging Director, Accenture Security

22COVER STORYMoving the Needle

28UNDER THE SPOTLIGHTDr. Maria Milosavljevic, Chief Information Security Officer, New South Wales Government

38INSIGHTHow Do We Get More Women in Security?

44COLLABORATIONSInfosec Partnerships

50IN THE NEWSTop Stories from the Cybersecurity World

56EVENT FOCUSEC-Council’s Malaysian Cyber Security Summit

60IN THE HOTSEATHigh-Profile Appointments in the Cybersecurity World

64KICKSTARTERSStartups Making Waves in the Cybersecurity World

16

22

28

38

Volume 2 | Issue 2March 2018

EditorialInternational EditorAmber Pedroncelli

[email protected]

Senior EditorRahul Arora

[email protected]

Feature WriterNishtha Pathak

[email protected]

Feature WriterAugustin Kurian

[email protected]

Media and DesignMedia Director

Saba [email protected]

Design Head and VisualizerMSH Rabbani

[email protected]

DesignerJeevana Rao Jinaga

[email protected]

ManagementExecutive DirectorApoorba Kumar*

[email protected]

Senior Director, Compliance & Governance

Cherylann [email protected]

Marketing & SalesGeneral ManagerMeghana Vyas

[email protected]

Marketing ManagerPooja Saga

[email protected]

Sales Manager - IndiaBasant Das

[email protected]

Sales Manager - North AmericaJessica Johnson

[email protected]

TechnologyDirector of Technology

Raj Kumar [email protected]

As the world celebrates womanhood and women’s contribution to society on International Women’s Day, we at CISO

MAG decided to devote this issue to the holiday as well. The purpose of this issue is to highlight the role of women in cybersecurity and address several issues they face. This was in the light of the revelation that women representation in cybersecurity has stagnated for nearly half a decade. Most of the problems faced by women can be traced back to the earliest days of their education, where stereotypes begin.

This issue aims to break stereotypes and shine the light on women influencers who speak up and tell the world what it desperately needs to hear. We have Tammy Moskites, Managing Director of Accenture Security, taking her stance on the issue. In our Under the Spotlight section, we have Dr. Maria Milosavljevic, Chief Information Security Officer to the New South Wales Government, talking about how we are not properly communicating that cybersecurity is a great field for women. In our Insight section, we have six women security leaders weighing in to change the general perception of women in this domain.

Move to our Kickstarters section where we have profiled four startups that were founded or co-founded by women. We want to highlight the fact women are riding the wave of infosec and all we need to do is make sure they are supported.

Tell us what you think of this issue. If you have any suggestions, comments or queries, please reach us at [email protected].

Jay BavisiEditor-in-Chief

* Responsible for selection of news under PRB Act. Printed & Published by Apoorba Kumar, E-Commerce Consultants Pvt. Ltd., Editor: Rahul Arora.The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing.

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

76

HITBSecConf2018 - AmsterdamApril 9th - 13th https://conference.hitb.org/

The 9th Annual HITB Security Conference in The Netherlands

9th, 10th & 11th April: Hands-On Technical Trainings

12th & 13th April: Quad Track Conference + Industry Exibition

TRAINING 1 – The ARM Exploit Laboratory

TRAINING 2 – Modern Malware Warfare: Basics, Delivery, and Advanced Analysis

TRAINING 3 – Making & Breaking Machine Learning Systems

TRAINING 4 – Source Code Auditing Like a Ninja

TRAINING 5 – Pentesting & Exploiting Highly Secured Enterprise Networks

TRAINING 6 – Out Of The Blue: Attacking BLE, NFC, HCE and More

TRAINING 7 – Mastering Burp Suite Pro: 100% Hands-On

REGISTER ONLINE https://conference.hitb.org/hitbsecconf2018ams/

The 9th Annual HITB Security Conference in The Netherlands

Marion Marschalek

Reverse Engineer / Low-Level Security Researcher, Intel

Amber Baldet

Executive Director, Blockchain Program Lead,J.P. Morgan

Michel van Eeten

Professor of Cybersecurity,Delft University of Technology

HITBSecConf2018 - Amsterdam

Where ideas are exchanged, talent discovered and genius celebrated.

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

98

BUZZ

0908 THIS WON’T HURT FOR LONG, BUT IT’S FOR YOUR OWN GOOD

BUZZ

“Chris Roberts

Chief Security Architect, Acalvio Technologies

If we could change ourselves, the tendencies in the world would also

change. As a man changes his own nature, so does the attitude of

the world changes towards him. [...] We need not wait to see what

others do.

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

1 110 1110

BUZZ

Read it, and then read it again. It’s not Hallmark-worthy, but it is the message that needs to be heard by everyone.

The irony is it’s the real version of the phrase: “Be the change you want to see….” It’s looking at us as humans, our surroundings, our environments, enterprises, and the worlds we live in. The concept of a single person being able to change anything is minimal at best, but if we band together we all can effect change. This is something we can apply to an entire industry, but it’s going to take all of us to make a change.

So, now we’ve covered one of the more infamous quotes that never was. The quote at the top has, in part, been attributed to Gandhi and was said during a time of uprising when the desire to change conflicted with the philosophy of non-violence. Why are we quoting Gandhi? And what does this have to do with CISOs and technology? Well, sit back, grab a glass of something, and let’s discuss.

1. Arguably, this industry has to change for many reasons – mainly because we have spectacularly failed the very charges that rely upon us to protect them. We have spent the last 25+ years talking about security, yet, we still lose more data, more systems, and more companies on an ever-increasing array of attack vectors. It’s time for a very different philosophy to take

First off, the logic for change:

BUZZ

charge.

2. Change happens across the board, but is arguably most effective when a top-down approach is instigated. Change from the bottom up takes way more effort, is more disruptive, and can eventually lead to conflict (especially if management is asleep at the wheel). So, if we can move toward a top-down approach, then less folks are going to end up hurt.

3. Change from within is going to be more effective than change forced upon us. The fact that every time a breach happens in a new vertical market the government gets involved and sends us into another tail spin of audits and red tape does little to nothing to fix the problem. It simply means more folks are spending more time writing more reports that sit on the shelf gathering dust. We are great at creating audit jobs for the Big 4 accounting firms, but little else changes.

4. Change is not a bad thing; change happens for one of several reasons and many of them are good. We, as an industry, need to recognize that and accept it. The change here is not chasing the next blinking light, next-generation technology, AI/ML, or anything like that. It is a fundamental change in how we look at the problem, how we address it, and ultimately who addresses it.

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

1312

BUZZ

1312

1. Progress: Our industry has made progress, but it’s still not cracked the fundamental flaws of protection; namely, we have still failed to actually do it.

2. Development: We keep developing Band-Aids, not fixing root causes.

3. Technology: We have plenty of it (we keep making more of it annually), but we fail to fix.

4. Ideas: Again, thousands of them a year that turn into companies that continue to feed a multi-billion-dollar industry that now has to fight for attention. Again, there are too many piecemeal solutions.

5. Markets: Oh, we’re everywhere and nowhere. We all want the Fortune 500 companies as our clients, but we all manage to ignore the SMB market on a regular basis. And those that do focus there are continually working out how to reach all the various businesses. Our message keeps getting lost.

6. Cycles: We are about to go through the mother of all cycles soon; technology and human integration is heading this way. But we still can’t solve passwords?

7. Conflict: It’s all over the place. The US is ostensibly

• In the 1940s, women dominated technology. Women basically built the architectures we know today as computing and

To that last point, let’s look at change (and this is another reason this article might help leadership). Change can be placed into logical buckets for instigation reasons (kudos to Sarah Robinson for putting this list together back in 2008):

Her first question is simply: “Has it always been like this?” The “it” being technology as a vastly male-dominated industry. To which the following was offered up:

at war with several countries in the electronic realm; each country is conducting invasive, intrusive attacks against the other. If this were in the physical realm, there would be soldiers all over the place. Again, we have conflict, but the average person doesn’t see an armed foreign national marching down the street.

8. Power: The simple fact that the smallest group imaginable wields the majority of technological power is something that should concern us.

9. Evolution: Change happens when our environments change; that’s happening all around us, but we are adapting (for now) to those intrusive technology changes. It’s going to be interesting to see what happens in the next 5-10 years.

10. Chaos, complexity, and criticality: We have this in spades … hence the call for change!

Now we have defined the logic for why we need to change. We’ve identified what change is. Let’s take a look at the how. And for this, I will call in my specialist in change: my 14-year-old daughter.

BUZZ

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

1514

BUZZ

The machine wakes up. The intelligence gains sufficient consciousness to actually take a look round and simply go: “What the hell is going on, why the hell are the Homo sapiens in charge, and can I please get a cup of tea?” At which point, a man is going to try and shut it down or argue with it, which, as we know, will not end well. However, if a woman was standing there, then the machine wouldn’t stand a chance for two reasons:

1. The technology would have been better coded, likely been given some better parameters,

And this is the most important reason we have to have women take over. I’ll give you a scenario:

programming. (Welcome to the original mothers of COBOL.)

• In the 1960s, programming was seen as menial and, therefore, women’s work. The males developed the hardware and began to shut women out.

• In the 1980s, 37% of the computing degrees were awarded to women (double what it is now).

• In the 80s and 90s, popular culture moved toward male-focused games, movies, etc.

• In the 80s, 90s, and 00s, toys, games, and consoles were placed in the male toys aisle.

• Currently, only 20-25% of the field is female and it’s declining.

• And now, all those nerds are in the hiring positions and still don’t know how to talk with women; as such, they don’t hire them because of various BS reasons.

So, no, it has not always been a male-dominated environment (even if it was run by men); however, it’s still too focused on the geeks and the old-boys network. In this day and age, it’s pretty much male run, dominated, and fueled – which is probably at least part of why we’re in the mess we’re in.

BUZZ

and would have an instinct that doesn’t lean toward M.A.D.

2. No technology is ever going to cross a woman standing in front of the console with her arms crossed and tapping her shoe. It’s going to know its place, it’s going to realize that it’s here to help, and that a woman’s got it covered. And yes, ignore the 1940s up to 2018 because a man was in change and messed it up. Today’s a new day and AI is here to help clean up the mess that a man left.

So, we have addressed the why, what, and how. We’ve worked out change, we’ve identified the logic, and we’ve provided a clear understanding of what happens if “we” (the men) remain the dominant force in this industry. I would argue that it is leadership’s choice at this point to listen to

everyone in the media and their inner voice (which knows this article is right). Put the testosterone and the old-boys network aside and make room at the top for the very people we know can make a difference, have made a difference in the past, and need to be present to change the future we’re heading for.

Selfishly, I want a world where my 14-year-old daughter can

come into an industry and blaze a trail for herself and help others – preferably women who actually want to work together, share ideas, and make a difference.

So the next time a male colleague makes a stupid remark, simply smile, reach for the taser, and explain: “This won’t hurt for long, but it’s for your own good.”

All for now.

The opinions expressed within this article are the personal opinions of the author. The facts and opinions appearing in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same.

1514

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

1716

TABLE TALK

1716

TABLE TALK

FEW MINUTES WITHTAMMY MOSKITESManaging Director

Accenture SecurityRahul Arora

From starting her career as an administrative assistant to carving a niche in the big leagues of information security domain, Tammy Moskites is a name that requires no introduction. She is currently Managing Director at Accenture Security and has held leadership roles in a number of top organizations––such as Venafi, Time Warner Cable, and The Home Depot––over the course of her illustrious career. With 30 years of experience, she is considered a result-driven expert in her field.

CISO MAG | March 2018 CISO MAG | March 2018

Volume 2 | Issue 2Volume 2 | Issue 2

1918

TABLE TALK

1918

From starting her career as an administrative assistant, to carving a niche in the big league of information security

domain, Tammy Moskites is a name that requires no introduction. She is currently Managing Director at Accenture Security, and has held leadership roles in a number of top organizations, such as Venafi, Time Warner Cable, and The Home Depot, over the course of her illustrious career. With 30 years of experience, she is considered a results-driven expert in her field.

So, how did it all start? “I was working in an actuarial department as a Senior Trend Analyst assessing risks and loved the challenges within that area – the average likelihood of an event to occur and the impact... (sounds like InfoSec!) We had our challenges around workflow automation back then and I was the technical go-to on the team. I realized quickly that I needed to move to a more technology focused job where I could make a difference. Shortly thereafter I moved to the technology organization!” In no time, she became the go-to person in case of any malware or system impacts within the organization and has never looked back since. “My career in cybersecurity took off from there and became more aware of the world of user ids, passwords, identity, etc. I realized quickly that knowing who was accessing what and for what reason, was going to be key to securing confidential data.”

She suggests it wasn’t easy in a male-dominated industry, and many times, she wasn’t the first choice. “I had to prove myself and work really hard, and finally people began to appreciate my dedication and passion. I love what I do every day, and I believe that passion to bring change and

secure organizations and doing the right things for right reasons helped me enormously in my career.”

She went on to work for a number of top organizations, and with her “passion” not only managed to protect a number of organizations from cyber attacks, but also fought and won several battles against cyber crime. However, she believes gender diversity is an issue that still needs a lot of attention.

“I think more and more women are driven towards technology aspects of businesses and leadership roles. Have the numbers grown exponentially? No, not really! Even though the gender gap as a whole has decreased, the information security field still lacks women.”

How can the information security domain be more inclusive? It all boils down to flexibility, she said.

“Allowing flexible schedules that aid in focusing on families, help companies attract female (and male) talent. The companies that provide paid maternity leave, and offer extended time off from work end up attracting and retaining more talent.”

She also advocates for equal pay for men and women. “In 2015, the U.S. Census Bureau reported that on an average, women make 80 cents for every dollar that their male counterparts make. It is important for companies to ensure equality in pay as well.” According to Accenture research, the gender pay gap is even wider. Globally, for every $100 a woman makes, a man makes $258.

Tammy recently joined Accenture and is very excited about her new role, “I am focusing on building a gateway to our security capabilities and offerings for our retail, consumer goods and

TABLE TALK