Download - D gonzalez issa_wis_2014
Women & the Future of Security Leadership
Women & the Future of Security Leadership
ISSA Women in Security SIG BreakfastKey Speaker: Deborah Gonzalez, Esq.
October 23, 2014
ISSA Women in Security SIG BreakfastKey Speaker: Deborah Gonzalez, Esq.
October 23, 2014
IntroductionIntroduction
2
Setting the ContextSetting the Context
• Early Morning
• Ten (10) Questions
• Many answers
• Answer Along: No right or wrong answers
• All relate to each other
• Early Morning
• Ten (10) Questions
• Many answers
• Answer Along: No right or wrong answers
• All relate to each other
3
Setting the ContextSetting the Context
“The future isn’t what we thought it would be. We don’t walk around in silver suits, travel to colonies on Mars or drive in flying cars. Instead, we dress
casual, take selfies and communicate in 140 characters.”
~ Greg Satell
“The future isn’t what we thought it would be. We don’t walk around in silver suits, travel to colonies on Mars or drive in flying cars. Instead, we dress
casual, take selfies and communicate in 140 characters.”
~ Greg Satell
4
Setting the ContextSetting the Context
“Always in motion is the future.”
~ YODA
Star Wars Episode V: The Empire Strikes Back
“Always in motion is the future.”
~ YODA
Star Wars Episode V: The Empire Strikes Back
5
What are the Current Challenges of IS?What are the Current Challenges of IS?
• Mobile: BYOD/BYON/BYOA/BYOW
• Hacker Sophistication
• Social Media/Online Activity
• Cloud/Data Storage
• User Denial/Resistance
• Privacy Standards (US & Global)
• Legislation/Regulation
• Business Operations - $$/Reputation
• Mobile: BYOD/BYON/BYOA/BYOW
• Hacker Sophistication
• Social Media/Online Activity
• Cloud/Data Storage
• User Denial/Resistance
• Privacy Standards (US & Global)
• Legislation/Regulation
• Business Operations - $$/Reputation
6
Four Possible Futures for ISFour Possible Futures for IS
7
What are the Future Challenges of IS?What are the Future Challenges of IS?
• Authentication: Beyond Biometrics
• Pervasive Technology: Everywhere and Invisible; Wearable, sensors, bicentennial man; The Circle: always being recorded; “Privacy is theft,” etc.
• Internet of Things
• No Boundaries for Data: Drones, Private vs. Professional
• Generational: Beyond the Millennial Generation
• Insurance Maturity
• Business Operations: Beyond $$
• Authentication: Beyond Biometrics
• Pervasive Technology: Everywhere and Invisible; Wearable, sensors, bicentennial man; The Circle: always being recorded; “Privacy is theft,” etc.
• Internet of Things
• No Boundaries for Data: Drones, Private vs. Professional
• Generational: Beyond the Millennial Generation
• Insurance Maturity
• Business Operations: Beyond $$
8
What are IS Management Challenges?What are IS Management Challenges?
• Get the right job done at the right place at the right time.– Assign the right people to do it– Allocation of Resources: Structures/Systems– Training/Update Systems/Update Training
• Shadow IT
• Enforcing Policy
• Security Implementation
• Recruiting/Retaining– On the ground level
• Get the right job done at the right place at the right time.– Assign the right people to do it– Allocation of Resources: Structures/Systems– Training/Update Systems/Update Training
• Shadow IT
• Enforcing Policy
• Security Implementation
• Recruiting/Retaining– On the ground level
9
What are IS Leadership Challenges?What are IS Leadership Challenges?
• Recruiting/Retaining– Talent vs Knowledge Management
• Succession Planning • Becoming a talent scout
• Developing Policy
• Developing Security Strategy– Incorporating Security Strategy into Business Strategy
• Budgeting
• Recruiting/Retaining– Talent vs Knowledge Management
• Succession Planning • Becoming a talent scout
• Developing Policy
• Developing Security Strategy– Incorporating Security Strategy into Business Strategy
• Budgeting
10
What is Required for IS Leaders?What is Required for IS Leaders?
• Change management
skills• Ability to influence• Build coalition• Critical thinking• Problem solving• Managerial ability• Emotional intelligence
• Change management
skills• Ability to influence• Build coalition• Critical thinking• Problem solving• Managerial ability• Emotional intelligence
11
• Creativity & innovation• Strategy execution• Strategy development • Ability for financial
analysis• Have initiative
What is Required for IS Leaders?What is Required for IS Leaders?
• Fitting in with the organizational culture
• Cultural sensitivity and fitting have to be married with the political and business savvy
• Linking security work to strategic objectives of the company – need to learn to talk money
• Right Communication skills – comfortable with speaking with the top
• Intelligence Community Skills: intelligence collection & analysis
• Fitting in with the organizational culture
• Cultural sensitivity and fitting have to be married with the political and business savvy
• Linking security work to strategic objectives of the company – need to learn to talk money
• Right Communication skills – comfortable with speaking with the top
• Intelligence Community Skills: intelligence collection & analysis
12
What’s Desired in an IS Leader?What’s Desired in an IS Leader?
• Accessibility
• Global and cultural acumen
• Transparency
• Authenticity
• Strategic Flexibility
• Accessibility
• Global and cultural acumen
• Transparency
• Authenticity
• Strategic Flexibility
13
• Interpersonal Agility
• Risk Leverage
• Rapid Decision Making
• Technological Savvy
How Can Women Fill the Gap?How Can Women Fill the Gap?
“Security is becoming less about technology and more about people – understanding their behavior,
and protecting users as they do their work. The study shows that women tend to value skills such as communication and education – the skills that
are currently in short supply.”
~ Michael Kassner, 2013
“Security is becoming less about technology and more about people – understanding their behavior,
and protecting users as they do their work. The study shows that women tend to value skills such as communication and education – the skills that
are currently in short supply.”
~ Michael Kassner, 2013
14
How Do I Become that Ideal IS Leader?How Do I Become that Ideal IS Leader?
• Commitment – accept the reality of what you are about to embark on
• Preparation – create your vision & your plan; learn
• Alliances – beyond networking; establish your own advisory board; be concerned of others
• Take calculated risks – initiate
• Commitment – accept the reality of what you are about to embark on
• Preparation – create your vision & your plan; learn
• Alliances – beyond networking; establish your own advisory board; be concerned of others
• Take calculated risks – initiate
15
How Do I Become that Ideal IS Leader?How Do I Become that Ideal IS Leader?
• Communicate – your ideas and tout your successes; the successes of other women; different mediums
• Maintain excellence & your integrity
• Persevere
• Give Back– This generation– Next generation– Seven generations Forward
• Communicate – your ideas and tout your successes; the successes of other women; different mediums
• Maintain excellence & your integrity
• Persevere
• Give Back– This generation– Next generation– Seven generations Forward
16
How Do I Create Other IS Leaders?How Do I Create Other IS Leaders?
• Create Awareness of the Issues– The problem: Blog, Write, Speak, Comment, etc.– Successful Solutions: All of the above + Celebrate
• Resources– Create– Make Available– Distribute Information About
• Create Awareness of the Issues– The problem: Blog, Write, Speak, Comment, etc.– Successful Solutions: All of the above + Celebrate
• Resources– Create– Make Available– Distribute Information About
17
How Do I Create Other IS Leaders?How Do I Create Other IS Leaders?
• Get Involved– Company Diversity Plan/Program– Company Leadership Plan/Program– Company/Community Mentor Programs– Company/Community Internship Programs– Company/Community STEM Programs– Professional IS Associations (and not just SIGs)
• Get Involved– Company Diversity Plan/Program– Company Leadership Plan/Program– Company/Community Mentor Programs– Company/Community Internship Programs– Company/Community STEM Programs– Professional IS Associations (and not just SIGs)
18
Developing Women IS Leaders: CasesDeveloping Women IS Leaders: Cases
• Hewlett Packard (HP) announced that it would finance a scholarship program, Scholarship for Women Studying Information Security (SWSIS), up to $250,000 (2014)
• Super Bowl 2014, GoldieBlox, a tech start-up that creates engineering toys for girls
• Lego Releases Female Scientists Set (2014)
• Magazine Articles/Profiles– InforSec Magazine (August 2014)– SC Magazine (July-Aug 2014)
• Hewlett Packard (HP) announced that it would finance a scholarship program, Scholarship for Women Studying Information Security (SWSIS), up to $250,000 (2014)
• Super Bowl 2014, GoldieBlox, a tech start-up that creates engineering toys for girls
• Lego Releases Female Scientists Set (2014)
• Magazine Articles/Profiles– InforSec Magazine (August 2014)– SC Magazine (July-Aug 2014)
19
Why is this important?Why is this important?
“Our future will be shaped by the assumptions we make about who we are and
what we can be.”
~ Rosabeth Moss Kanter
“Our future will be shaped by the assumptions we make about who we are and
what we can be.”
~ Rosabeth Moss Kanter
20
Why is this important?Why is this important?
"Future is not a noun, it's a verb.”
~Bruce Sterling
"Future is not a noun, it's a verb.”
~Bruce Sterling
21
ConclusionConclusion
Remember:
It’s not just about the answers
you put on paper today;
it’s the actions you take as next steps
that make the difference.
Remember:
It’s not just about the answers
you put on paper today;
it’s the actions you take as next steps
that make the difference.
22
Q&AQ&A
23
Thank you and Contact InformationThank you and Contact Information
Deborah Gonzalez, Esq.Law2sm, LLCwww.law2sm.com@[email protected]
Managing Online Risk: Apps, Mobile, & Social Media Securitywww.managingonlinerisk.com@DGOnlineSec
Deborah Gonzalez, Esq.Law2sm, LLCwww.law2sm.com@[email protected]
Managing Online Risk: Apps, Mobile, & Social Media Securitywww.managingonlinerisk.com@DGOnlineSec
24