D gonzalez issa_wis_2014

24
Women & the Future of Security Leadership ISSA Women in Security SIG Breakfast Key Speaker: Deborah Gonzalez, Esq. October 23, 2014

description

This was the breakfast keynote for the ISSA Women in Security SIG held at the Disney Contemporary in October, 2014. The session looks at the info security issues from what can be expected in the near and mid-term future, the challenges of management and leadership talent in this area, and how women can uniquely fill the leadership gap.

Transcript of D gonzalez issa_wis_2014

Page 1: D gonzalez issa_wis_2014

Women & the Future of Security Leadership

Women & the Future of Security Leadership

ISSA Women in Security SIG BreakfastKey Speaker: Deborah Gonzalez, Esq.

October 23, 2014

ISSA Women in Security SIG BreakfastKey Speaker: Deborah Gonzalez, Esq.

October 23, 2014

Page 2: D gonzalez issa_wis_2014

IntroductionIntroduction

2

Page 3: D gonzalez issa_wis_2014

Setting the ContextSetting the Context

• Early Morning

• Ten (10) Questions

• Many answers

• Answer Along: No right or wrong answers

• All relate to each other

• Early Morning

• Ten (10) Questions

• Many answers

• Answer Along: No right or wrong answers

• All relate to each other

3

Page 4: D gonzalez issa_wis_2014

Setting the ContextSetting the Context

“The future isn’t what we thought it would be. We don’t walk around in silver suits, travel to colonies on Mars or drive in flying cars. Instead, we dress

casual, take selfies and communicate in 140 characters.”

~ Greg Satell

“The future isn’t what we thought it would be. We don’t walk around in silver suits, travel to colonies on Mars or drive in flying cars. Instead, we dress

casual, take selfies and communicate in 140 characters.”

~ Greg Satell

4

Page 5: D gonzalez issa_wis_2014

Setting the ContextSetting the Context

“Always in motion is the future.”

~ YODA

Star Wars Episode V: The Empire Strikes Back

“Always in motion is the future.”

~ YODA

Star Wars Episode V: The Empire Strikes Back

5

Page 6: D gonzalez issa_wis_2014

What are the Current Challenges of IS?What are the Current Challenges of IS?

• Mobile: BYOD/BYON/BYOA/BYOW

• Hacker Sophistication

• Social Media/Online Activity

• Cloud/Data Storage

• User Denial/Resistance

• Privacy Standards (US & Global)

• Legislation/Regulation

• Business Operations - $$/Reputation

• Mobile: BYOD/BYON/BYOA/BYOW

• Hacker Sophistication

• Social Media/Online Activity

• Cloud/Data Storage

• User Denial/Resistance

• Privacy Standards (US & Global)

• Legislation/Regulation

• Business Operations - $$/Reputation

6

Page 7: D gonzalez issa_wis_2014

Four Possible Futures for ISFour Possible Futures for IS

7

Page 8: D gonzalez issa_wis_2014

What are the Future Challenges of IS?What are the Future Challenges of IS?

• Authentication: Beyond Biometrics

• Pervasive Technology: Everywhere and Invisible; Wearable, sensors, bicentennial man; The Circle: always being recorded; “Privacy is theft,” etc.

• Internet of Things

• No Boundaries for Data: Drones, Private vs. Professional

• Generational: Beyond the Millennial Generation

• Insurance Maturity

• Business Operations: Beyond $$

• Authentication: Beyond Biometrics

• Pervasive Technology: Everywhere and Invisible; Wearable, sensors, bicentennial man; The Circle: always being recorded; “Privacy is theft,” etc.

• Internet of Things

• No Boundaries for Data: Drones, Private vs. Professional

• Generational: Beyond the Millennial Generation

• Insurance Maturity

• Business Operations: Beyond $$

8

Page 9: D gonzalez issa_wis_2014

What are IS Management Challenges?What are IS Management Challenges?

• Get the right job done at the right place at the right time.– Assign the right people to do it– Allocation of Resources: Structures/Systems– Training/Update Systems/Update Training

• Shadow IT

• Enforcing Policy

• Security Implementation

• Recruiting/Retaining– On the ground level

• Get the right job done at the right place at the right time.– Assign the right people to do it– Allocation of Resources: Structures/Systems– Training/Update Systems/Update Training

• Shadow IT

• Enforcing Policy

• Security Implementation

• Recruiting/Retaining– On the ground level

9

Page 10: D gonzalez issa_wis_2014

What are IS Leadership Challenges?What are IS Leadership Challenges?

• Recruiting/Retaining– Talent vs Knowledge Management

• Succession Planning • Becoming a talent scout

• Developing Policy

• Developing Security Strategy– Incorporating Security Strategy into Business Strategy

• Budgeting

• Recruiting/Retaining– Talent vs Knowledge Management

• Succession Planning • Becoming a talent scout

• Developing Policy

• Developing Security Strategy– Incorporating Security Strategy into Business Strategy

• Budgeting

10

Page 11: D gonzalez issa_wis_2014

What is Required for IS Leaders?What is Required for IS Leaders?

• Change management

skills• Ability to influence• Build coalition• Critical thinking• Problem solving• Managerial ability• Emotional intelligence

• Change management

skills• Ability to influence• Build coalition• Critical thinking• Problem solving• Managerial ability• Emotional intelligence

11

• Creativity & innovation• Strategy execution• Strategy development • Ability for financial

analysis• Have initiative

Page 12: D gonzalez issa_wis_2014

What is Required for IS Leaders?What is Required for IS Leaders?

• Fitting in with the organizational culture

• Cultural sensitivity and fitting have to be married with the political and business savvy

• Linking security work to strategic objectives of the company – need to learn to talk money

• Right Communication skills – comfortable with speaking with the top

• Intelligence Community Skills: intelligence collection & analysis

• Fitting in with the organizational culture

• Cultural sensitivity and fitting have to be married with the political and business savvy

• Linking security work to strategic objectives of the company – need to learn to talk money

• Right Communication skills – comfortable with speaking with the top

• Intelligence Community Skills: intelligence collection & analysis

12

Page 13: D gonzalez issa_wis_2014

What’s Desired in an IS Leader?What’s Desired in an IS Leader?

• Accessibility

• Global and cultural acumen

• Transparency

• Authenticity

• Strategic Flexibility

• Accessibility

• Global and cultural acumen

• Transparency

• Authenticity

• Strategic Flexibility

13

• Interpersonal Agility

• Risk Leverage

• Rapid Decision Making

• Technological Savvy

Page 14: D gonzalez issa_wis_2014

How Can Women Fill the Gap?How Can Women Fill the Gap?

“Security is becoming less about technology and more about people – understanding their behavior,

and protecting users as they do their work. The study shows that women tend to value skills such as communication and education – the skills that

are currently in short supply.”

~ Michael Kassner, 2013

“Security is becoming less about technology and more about people – understanding their behavior,

and protecting users as they do their work. The study shows that women tend to value skills such as communication and education – the skills that

are currently in short supply.”

~ Michael Kassner, 2013

14

Page 15: D gonzalez issa_wis_2014

How Do I Become that Ideal IS Leader?How Do I Become that Ideal IS Leader?

• Commitment – accept the reality of what you are about to embark on

• Preparation – create your vision & your plan; learn

• Alliances – beyond networking; establish your own advisory board; be concerned of others

• Take calculated risks – initiate

• Commitment – accept the reality of what you are about to embark on

• Preparation – create your vision & your plan; learn

• Alliances – beyond networking; establish your own advisory board; be concerned of others

• Take calculated risks – initiate

15

Page 16: D gonzalez issa_wis_2014

How Do I Become that Ideal IS Leader?How Do I Become that Ideal IS Leader?

• Communicate – your ideas and tout your successes; the successes of other women; different mediums

• Maintain excellence & your integrity

• Persevere

• Give Back– This generation– Next generation– Seven generations Forward

• Communicate – your ideas and tout your successes; the successes of other women; different mediums

• Maintain excellence & your integrity

• Persevere

• Give Back– This generation– Next generation– Seven generations Forward

16

Page 17: D gonzalez issa_wis_2014

How Do I Create Other IS Leaders?How Do I Create Other IS Leaders?

• Create Awareness of the Issues– The problem: Blog, Write, Speak, Comment, etc.– Successful Solutions: All of the above + Celebrate

• Resources– Create– Make Available– Distribute Information About

• Create Awareness of the Issues– The problem: Blog, Write, Speak, Comment, etc.– Successful Solutions: All of the above + Celebrate

• Resources– Create– Make Available– Distribute Information About

17

Page 18: D gonzalez issa_wis_2014

How Do I Create Other IS Leaders?How Do I Create Other IS Leaders?

• Get Involved– Company Diversity Plan/Program– Company Leadership Plan/Program– Company/Community Mentor Programs– Company/Community Internship Programs– Company/Community STEM Programs– Professional IS Associations (and not just SIGs)

• Get Involved– Company Diversity Plan/Program– Company Leadership Plan/Program– Company/Community Mentor Programs– Company/Community Internship Programs– Company/Community STEM Programs– Professional IS Associations (and not just SIGs)

18

Page 19: D gonzalez issa_wis_2014

Developing Women IS Leaders: CasesDeveloping Women IS Leaders: Cases

• Hewlett Packard (HP) announced that it would finance a scholarship program, Scholarship for Women Studying Information Security (SWSIS), up to $250,000 (2014)

• Super Bowl 2014, GoldieBlox, a tech start-up that creates engineering toys for girls

• Lego Releases Female Scientists Set (2014)

• Magazine Articles/Profiles– InforSec Magazine (August 2014)– SC Magazine (July-Aug 2014)

• Hewlett Packard (HP) announced that it would finance a scholarship program, Scholarship for Women Studying Information Security (SWSIS), up to $250,000 (2014)

• Super Bowl 2014, GoldieBlox, a tech start-up that creates engineering toys for girls

• Lego Releases Female Scientists Set (2014)

• Magazine Articles/Profiles– InforSec Magazine (August 2014)– SC Magazine (July-Aug 2014)

19

Page 20: D gonzalez issa_wis_2014

Why is this important?Why is this important?

“Our future will be shaped by the assumptions we make about who we are and

what we can be.”

~ Rosabeth Moss Kanter

“Our future will be shaped by the assumptions we make about who we are and

what we can be.”

~ Rosabeth Moss Kanter

20

Page 21: D gonzalez issa_wis_2014

Why is this important?Why is this important?

"Future is not a noun, it's a verb.”

~Bruce Sterling

"Future is not a noun, it's a verb.”

~Bruce Sterling

21

Page 22: D gonzalez issa_wis_2014

ConclusionConclusion

Remember:

It’s not just about the answers

you put on paper today;

it’s the actions you take as next steps

that make the difference.

Remember:

It’s not just about the answers

you put on paper today;

it’s the actions you take as next steps

that make the difference.

22

Page 23: D gonzalez issa_wis_2014

Q&AQ&A

23

Page 24: D gonzalez issa_wis_2014

Thank you and Contact InformationThank you and Contact Information

Deborah Gonzalez, Esq.Law2sm, LLCwww.law2sm.com@[email protected]

Managing Online Risk: Apps, Mobile, & Social Media Securitywww.managingonlinerisk.com@DGOnlineSec

Deborah Gonzalez, Esq.Law2sm, LLCwww.law2sm.com@[email protected]

Managing Online Risk: Apps, Mobile, & Social Media Securitywww.managingonlinerisk.com@DGOnlineSec

24