Cyber security is a business accelerator
Darine Fayed, Head of Legal and Data Protection Officer (DPO) at Mailjet
Companies today are more interconnected than ever before, this has placed cyber security at the core of sustainable business models. Now, technical and legal departments are more involved in driving growth with the business than ever before.
Darine Fayed, Head of Legal and Data Protection Officer (DPO) at Mailjet, has successfully led a data protection and security transformation program in order to tackle the legal challenges related to the General Data Protection Regulation (GDPR). All the effort, time and money invested in cyber security and data protection allowed her company to grow its business with minimal risk. In fact, today, under Darine’s direction, Mailjet is accredited by AFNOR Certification as being GDPR compliant, adding to their ISO 27001 certification already obtained.
“After obtaining my law degree and working as a corporate attorney in the United States, I moved to France to continue on the same track. I naturally shifted toward digital and IT topics, working on licensing and software agreements for my law firm’s clients.
After over a decade in corporate law, I became Head of Legal, responsible for risk management at group level, at Mailjet, Europe’s leading email service provider. With the arrival of the EU’s new General Data Protection Regulation in 2016, most companies were obliged to implement actions to comply with the upcoming regulation. One of these actions was the appointment of a DPO. Due to my position and digital experience at the time, I was asked to manage the data privacy obligations and lead the transformation across the business, legal and IT teams as Mailjet’s Data Protection Officer. One of my objectives was achieving GDPR compliance through close collaboration with IT teams.
It took Mailjet over one year to become fully compliant with the GDPR’s strict requirements; one year during which I discovered new aspects of cyber security and learned about data protection challenges.
Simultaneously, I also advocated for legal tech (technology at the service of the law), aiming to combine digital and legal endeavours in companies. Specifically, I worked on including cyber security considerations in the legal yearly goals.”
Darine strongly believes in security by default. Every decision in a business process must be taken with security in mind, particularly when personal data is involved. To do so, Darine describes this industry as follows:
“Cyber security is awareness, cyber security is top-down, cyber security is a team effort, cyber security starts with legal considerations”.
Cyber security is awareness
Because it affects every employee in a company, Darine argues that cyber security is everyone’s business. The process starts with internal training and building awareness among Business, Marketing, HR and IT teams. Once there is a notable shift in the corporate mind-set, people start to see security not as a burden but as a foundation to business. Darine explains how, when working on new features in a platform or a system, a company’s security awareness improves quality and customer satisfaction:
“Product developers now ask the right questions: How do I make this product secure? How will data be collected or processed in this new feature? What system or measures do I have to put in place in order to secure and restrict the access to this feature?”
Cyber security is top-down
As previous projects carried out by Mailjet’s technical teams received pushback from the business, Darine believes that the ownership of IT security inside her company has shifted to the top: “Our CEO has driven the GDPR compliance initiatives that provided the necessary support to carry out the transformation and convince people who were still resistant to change.” Once senior management understands the importance and defines the objectives of the project, it becomes easier to get everyone on board to pursue the same vision.
Cyber security is a team effort
When we talk about team effort, we tend to view only the internal organization teams. A cyber security project can only succeed by involving all the individuals connected to a company. A company is an ecosystem of employees, partners, suppliers, clients and providers. With the GDPR, companies do not just comply with the regulation, but learn who their partners are and how to work with them:
“We had to terminate some contracts with our providers that didn’t provide the level of security that we needed. Each company needs to surround itself with providers for whom cyber security and data protection is a common objective. Indeed cyber security can become competitive advantage when the core business of a company collaborates with third parties and clients.”
Cyber security starts with legal considerations
In cyber security, people that understand applicable laws and regulations must be in charge of legal activities. The GDPR is the perfect example of a regulation that took businesses by storm. Organisations will now be put out of business if they do not have cyber security embedded within their DNA. As Darine explains, a legal department’s objective is to ensure minimal risk for the company, including cyber risk; this must be leveraged in security and privacy efforts:
“With all my previous experience in law firms, it was more natural for me to use my legal logic to manage GDPR compliance projects. I was able to interpret the regulation that allowed me to collaborate with the CTO on this journey. The translation from the legal compliance of a system to IT actions has been very interesting and rewarding for me.”
When reflecting on her career and how she was able to apply her legal background to cyber security challenges, Darine highlights the importance of continuous learning and how it has helped her deal with new situations:
“No matter if it is your goal to make cyber security your career, or if you are just curious as to how your data is processed, or even if you just want to know how to make your password a little stronger, it’s important to be deeply invested in an evolving subject like data protection. It’s no longer only clients’ concerns, but individuals’ concerns that can be leveraged as learning opportunities.”
Will humans be relevant in the future of cyber security?
Nathalie Weiler, CISO at SwissSign Group
Advances in automation, machine learning and artificial intelligence affect all areas of expertise – and cyber security is no exception. In cyber security, these advancements have enabled the delegation of time-consuming tasks such as manual threat detection and analysis to machines, freeing up the human workforce to focus on threat forecasting, cyber security strategy and governance. Dr. Nathalie Weiler – CISO at SwissSign – believes that the role humans play in cyber security has fundamentally changed and with the role, the skills required by the workforce have changed as well.
“After completing my PhD and post-doc in network security at Zurich’s Swiss Federal Institute of Technology, ETH, I realised that I didn’t want to pursue the classic academic career path of hopping from university to university. More importantly, I was most interested in the practical applications of cyber security. So in parallel to my post-doc, I co-founded a technical consultancy company, where we ran projects in secure IoT activities and building security protocols for multi-media devices.
While I was organising a conference for peer-to-peer networking at ETH, I got the opportunity to connect with many people in the industry. An architect from Credit Suisse approached me for a one-time project addressing a network security issue they were facing - I ended up working with that bank for twelve years, immersing myself in so many fulfilling and interesting projects.
There is no area in cyber security that I didn’t get involved with in my time at the bank. One day, a head-hunter approached me and asked me to join Avaloq to build up their security governance team and frankly, the position with Avaloq came at the perfect time for me; I was ready for the next big challenge of my career. So I took the position and stayed with Avaloq as their CISO for three years. Now, I’m excited to continue my journey as the CISO at SwissSign.”
The shifting frontier: cyber security skills yesterday and today
In the early days, the role of cyber security professionals was mainly to protect IT infrastructure and data. The role was reactive in nature: when a threat appeared or a risk materialised, it was all hands on deck to eliminate it as quickly as possible. Therefore, deep technical knowledge of IT infrastructure was in high demand.
Today, cyber security has expanded to include third parties, cloud environments, mobile devices and everything in between. Global digitalisation and the IoT have also shaped cyber security needs since these opened up a myriad of new opportunities that cyber criminals can - and do - exploit. It is therefore important for cyber security teams to have a broad range of skills to cover all of these environments and threats. In addition, with an increasingly common understanding that cyber incidents are inevitable, anticipating what attackers are going to do before they do it is key. Employees with the foresight and ability to think like attackers are the ones that will provide the most value. Nathalie puts it candidly:
“Attackers will not always use a hammer to get in. They are constantly developing different skills, tools and approaches, so it’s important that we stay ahead and think like them.”
With visibility all the way to the top of organisations, persuasion has also become an essential skill to master. Nathalie reflects on the importance of her consulting background in helping her implement her cyber security program:
“I wouldn’t be here if I didn’t have a consulting background. As a CISO, you need to be able to convince many different stakeholders to secure funding and get buy-in. Half of my success is based on how persuasive I can be.”
As money and resources are always finite, Nathalie articulates the importance of adopting a risk-based and pragmatic approach:
“You need to be able to get your ideas across, taking into consideration the uncertainty.”
Looking to the future
Solutions in use today will undoubtedly become less effective at some point in the future, and since no solution can be completely secure, security professionals need to be able to embrace failure as part of the process. As a result, Nathalie argues that nowadays, the field has demand for professionals with various backgrounds but with a common trait:
“We need people who can look further into the challenges that they’re presented with and see the big picture. We need people who understand why they need to do things in a certain way and can actually see the implications of their actions on business processes.”
As our lives continue to get more interconnected, the needs of the cyber security workforce will continue to evolve. There will always be new cyber security threats lurking on the horizon and regardless of how the field evolves in the decades to come, Nathalie believes that having the right attitude is essential:
“You need to break out and recognise that it’s a journey. It’s important to take your time with each problem and remember that threat actors will always come up with new methods of attack.”
Adopting this perception from the start lets you actually come to pragmatic solutions that work.
Nowhere is the fog of war thicker than in cyberspace
Chelsey Slack, Deputy Head of the Cyber Defence Section at NATO
For more than a decade, cyberspace has slowly but surely crept into our daily lives, going from being an experiment spearheaded by few to integrating nearly every one of our devices in our pockets, work devices, household objects and infrastructure management systems. This evolution prompted NATO to add cyber defence to its core task of collective defence. Cyberspace has also been recognised as a domain of operations, with NATO allies recognizing the evolution of threats and seeing the need to be just as effective in cyberspace as in other domains such as air, land and sea. Although the principles underpinning the protection of this space are grounded in the same concepts as traditional domains, Chelsey Slack, Deputy Head of Cyber Defence at NATO, highlights key differences between these domains and what these differences mean in the context of international security.
“Growing up in Canada, my favourite subjects were always related to history, social studies and law. During high school, I had my first exposure to international relations; I learned about how countries work together and what they saw as key issues. That really piqued my interest and I decided to pursue my university studies in political science with a focus on international security.
Later, I worked for the Canadian foreign ministry and realised that I wanted experience in a multilateral context. After getting my Bachelor’s degree, I landed an internship at NATO, where I worked on trans-national threats.
One day during that internship, on my way home for Christmas, I wound up sitting at the airport, waiting for my delayed flight. I starting talking to the person sitting next to me; at the time, I was just about to submit my online application to a Master’s program and this man asked me about my research proposal. When I told him that I wanted to look into post-war reconstruction, this stranger, who worked in a similar field, looked at me very bluntly said: “That’s a very interesting topic but there are a lot of people working on it. I think you should consider focusing on something else.
When I got back to my internship after the holidays and my supervisor involved me in the development of one of NATO’s cyber defence policies, I knew this was what I had to write my thesis on… and I’ve been working on that same topic ever since!”
Chelsey sees cyberspace as a vector of potential and innovation that relies on open collaboration and exchange platforms and brings many benefits to society. That’s why she is passionate about her work in cyber defence at NATO:
“It’s about ensuring that cyberspace remains the open, secure and transparent place that we need it to be, to continue to harness those benefits.”
Although the same principle of collective defence – where an attack against one ally is considered as an attack against all allies – underpins cyberspace as it does air, land and sea, Chelsey has developed a deep understanding of how bringing this principle to life in cyberspace is different.
The first difference resides in the nature of this space: it is intangible.
“You can see troops, you can see tanks, and you can see planes that cross your border; but it’s not so easy to see an attack or understand what you’re dealing with in cyberspace.”
The second is that cyberspace underpins our communication systems and critical infrastructure, linking it to every other domain, while remaining a distinct domain of operation. The third is the pace of innovation and technological changes in cyberspace and its effect on established procedures. In the past, you could buy a new piece of equipment, for instance a truck or a tank, and it would be good to go for years.
“In cyberspace, you have to constantly keep up with the development of technology. The minute you buy a new piece of equipment, it’s already out of date.”
This speed does not only affect the technology:
“You need to make sure you train the people so they are able to operate in this constant state of change.”
In addition, although NATO allies recognized that international law applies in cyberspace, the domain’s specificities pose challenges:
“How do you impose consequences? What is the best way to enforce the international law that we have to draw upon?”
Lastly, the number and diversity of actors involved in cyberspace is far greater than on land, in the sea or in the air. Each one of these actors, many of which are private, is a potential target. This makes governments’ role in managing cyber threats and responding to them significantly more complicated.
As the fog of war is thicker in cyberspace, there are still plenty of questions being debated amongst allies. When NATO recognized cyber defence as a part of its core tasks of collective defence, there was deliberately no threshold set to determine what it would take for a cyber attack to be considered an act of war:
“This decision is context-dependent and ultimately needs to be a political one”.
Additionally, if a cyber attack were to be grounds to invoke Article 5, it would not mean the allies’ response would have to leverage cyber capabilities.
“That’s part of the cross-domain approach; cyber is but one tool in our toolbox.”
Many of us do not think about cyber security through the foggy lens of war. Professionals like Chelsey bring cyber security from a commercial concept to one of international security, and ultimately, will have an enormous influence on the world we live in.
Hard work, ambition, and a strong academic background are the recipe for success
Dolores Perez, Head of Group Data Protection at KBL European Private Bankers S.A.
Hard work, ambition, and a strong academic background are the recipe for success for Dolores Perez. Unmatched by her predecessors, Dolores held the position of CISO at the international private bank KBL for more than 6 years. Her previous experience in consulting developed her perseverance and ability to make an impact with top management. These two skills have been key to her success.
Dolores started her career armed with an engineering and finance diploma from the esteemed Louvain University in Belgium. “From my point of view, a career needs to be built on confidence. Having a good diploma is very important as it already gives you credibility and confidence in what you can do. It shows that you have some grey matter in your head”. She entered the professional world with an adventurous mind looking for new challenges and travels. Dolores first joined a consulting firm and seized the opportunity to work all over Europe in core banking system integration. Then Dolores joined KBL as a supervisor of KBL & Subsidiaries Internal Audit. She evaluated the risks at subsidiaries located in many places including Spain, Germany, England, and Ireland for eight years. This first position at KBL helped her to gain a deep understanding of all the processes within the company.
“Being an auditor of the group requires strength and direction. You usually end up in a new country where, as an auditor, you are not always well received, and you need to fight your way in”.
After her success in audit, Dolores was promoted to the group’s CISO, and more recently DPO. Dolores’ journey is a good example of how you can flourish in a large international company.
Having climbed to the top of the corporate ladder, Dolores takes a step back and explained what she called the “rubber band” effect, an effect one can experience in a career. Dolores then gives her advice on how to react to this effect, i.e. how to pull the rubber band, specifically in cyber security.
Rubber band effect
Dolores has a good metaphor for a career, especially for women in cyber security. Rubber bands are stiff at first just like careers: You need to pull on them to grow and progress. Sometimes, the rubber band will snap back into its original position if pulling too hard, and this can hurt. But eventually, the rubber will stretch and grow if you keep pulling it continuously.
“I mean several things by this. First, you need to accept failure and never expect to succeed every time. When you fail, it usually means that you need to change. Second, you need to have a lot of resilience. It is easy to say “be resilient”, but this can only be achieved if you believe in yourself and never compare yourself to others. Last but not least, do not be naïve in moments of difficulty. It is only the spring back, and it means you need to keep pulling.”
For Dolores, pulling the rubber band actually starts very early in life. Dolores believes that it is very important, especially for young girls, to have a role model and not to be subject to any limitations. During education, children must receive encouragement, ambition and self-confidence to tackle the world’s challenges head-on. Even if you are the person pulling your own rubber band career, Dolores recognises that other people can add a little strength in pulling. Networking should be seen as part of your job although it can be challenging at the beginning.
“It is something I hadn’t understood in the early start of my career. When networking, I had the impression I was not actually doing my job. I felt guilty. But that’s the wrong vision. Networking is part of your job and usually is a mutually beneficial activity. You learn from others and others learn from you. More than that, working hard 100% of the time is not always the way. Sometimes you need to step back and take time to build your career”.
Dolores’ recipe to pull her rubber band
Consulting gives you an incredible advantage in a CISO level position
“I was always a high-level person seeing the big picture. Consulting and audit jobs made me go deeper into details, which is a necessary skill for your career. It is easier to master a subject you experienced, not just read about. Consultants also gain experience very quickly as they interact with many different clients. Finally, I was exposed to management and executives very early on in my career, which taught me to synthesise”.
With her consulting experience, Dolores was armed with strong skills and deep knowledge to pursue her career at an international private bank.
Break down bias and don’t hesitate to seize opportunities for yourself
Dolores acknowledges that as a woman you sometimes face additional challenges, especially when it comes to breaking down biases. Dolores recalls a particularly intense moment in her life. While she was still on maternity leave for her second child, a position as group auditor opened up in Spain. She deeply believed she was the best fit for the position and she applied by sending an email directly to the bank’s CEO. As one key advice, Dolores stated:
“you should not be afraid to put the tennis ball just at the limit of the court: on the white line”.
Having the courage to apply, Dolores got the position of Group Auditor and moved to Spain.
Don’t hesitate to deep dive into a new subject
Dolores entered into Cyber Security later in her career. She is a good example that it is possible to jump into a moving train like the ever-changing field of Cyber Security. Dolores had to learn about Cyber Security through trainings, certifications and by consulting expert advice.
“I ended up in the security field by accident. Entering a new field, one needs to be humble and re-evaluate what one knows and needs to learn about the subject. I had to study very hard and would always suffer from headaches at end of the day during that period. You need to do something 21 times to change a habit.”
Aided by her scientific background and perseverance, she quickly embraced her new responsibilities.
“When I took the job, the CISO position was perceived as high-risk due to the increasing volume of cyber-attacks and breaches being discovered in the Financial Sector. Despite the warning of my friends and colleagues, I persevered. I’ve always liked to protect others, which is probably linked to a maternal instinct. I am not afraid to make decisions and assume the responsibilities for them, even in a high-risk position. That is probably why I stayed on as a CISO for 6 years.”
Communication skills and support from others are of great value
During her time as CISO, Dolores recalls that it was challenging to convey messages regarding security to top management.
“As a CISO, you need to be able to communicate in a simple and understandable way with all levels from operational to top management. Marketing skills are as important as hard technical skills. Yes, computers are very interesting, but as CISO, you also need to understand people, and especially the people sitting in the chairs of the Board.”
Dolores was recently promoted to the role of DPO where she will work hand-in-hand with the new CISO.
“In my opinion, DPOs and CISOs are strong supports one to another. The CISO focuses on security and the DPO focuses on compliance but both have the common objective to protect data. With the compliance dimension, DPOs can position CISOs at board level. When two voices are raised together, it makes a bigger impact.”
Gender diversity in cyber security
“Gender diversity is imperative to the success of the cyber security industry. At Deloitte we want to spark change and address the low representation of women in the cyber security workforce”
Phill Everson - Lead Cyber Partner Deloitte UK & Global Cyber Talent Partner
Becoming a cyber leader, bit by bit
Dr. Maya Bundt, Head of Cyber and Digital Solutions at Swiss Re
To all those who fear their careers have so many twists and turns that they will never get to the top, Dr. Maya Bundt, Head of Cyber and Digital Solutions at Swiss Re may help you reconsider. As she puts it “if I look back from where I started, it looks like I picked each and every job at Swiss Re in order to get to where I am now. But while I was on that journey, it didn’t seem that way.” Whether in cyber insurance or cyber in general, Maya’s advice to those who want to step into the field is “accept non-linearity in your career.” From the outside, what may seem like a straight dash to the finish line, feels more like navigating through a giant jungle gym from the inside. However, as non-linear as it may be, Maya has seen every role change and every risk as a critical step in the journey that is her career.
“I’m a natural scientist at heart. My passion for the topic and our planet led me to pursue my education in environmental sciences. With my Master’s degree in hand, I decided to continue in this direction and obtained a PhD in soil physics. As many of my fellow doctors, I was then faced with the question of what to do next: stay in academia or move into industry? Having spent most of my life in school, I decided to make a change and got a job as a strategy consultant. Three years later, I joined Swiss Re as a senior project manager. After fourteen years with Swiss Re, I’m now the Head of Cyber and Digital Solutions.
Looking back, it’s clear that each move I made and job I took was exactly what I needed to get to my current role. But at the time of taking all of these decisions, there was no such thing as cyber insurance. So, at the start of my career, I wasn’t looking for this job because it simply didn’t exist; the entire field didn’t exist! However, with time, it became evident that what Swiss Re and other financial service providers could do in a new digitalised world would also create great vulnerabilities. I thought that was fascinating!
Now, I absolutely see myself staying here. Cyber insurance is the most exciting field you can imagine. There is so much to do and there are so many facets, which means that there’s room for people from all kinds of backgrounds.”
Maya breaks her journey down into three phases – getting started, broadening her skillset and leading her own team – and highlights the lessons she has learned along the way.
The early years
Reflecting on her experience in more junior roles, Maya remembers learning how to convince and negotiate:
“You often don’t have the formal authority to get things done”. She argues that a key skill for those starting their careers is to work with others to achieve one’s own goals and ensure those who help also benefit and get recognised. Maya highlights that, along with technical, theoretical and practical knowledge, one must never underestimate the importance of personal networks, soft skills and collaboration: “It doesn’t matter who you are or how good you are. Nobody can achieve great things by themselves.”
Stepping up your game
Maya strongly believes that everyone has room for improvement. She quotes the popular saying:
“If you’re the smartest person in the room… then you’re in the wrong room.”
Although it may be more comfortable to be the big fish in a small pond, true personal development requires constantly seeking to gain new skills. She emphasises that even those that have mastered one particular area of expertise can and must learn from their colleagues and branch out. This is especially true in cross-functional disciplines such as cyber insurance, where each member of a team should bring a certain expertise, be it underwriting, technical cyber security or law, and make the effort to become proficient in other relevant areas. Not only does this contribute to great team dynamics; it inevitably results in better solutions.
Taking on the responsibility of leadership
In her current role, Maya is not responsible for protecting Swiss Re’s infrastructure, systems or data. Instead, she is in the business of building cyber insurance solutions and developing the market. For these tasks, she needs a team with many different skills and argues that she would be very hard pressed to find all of them in the same person. However having fostered a multi-disciplinary team means that Maya is regularly presented with questions or solutions that challenge her views. Regardless, she sees this as a gift and when asked what advice she would give other leaders in cyber security, she replies “listen to what you don’t want to hear.” She believes that leaders should not only be open-minded; they must also proactively encourage and reward those that constructively disagree with them.
In summarising how she became the Head of Cyber Solutions at Swiss Re, Maya reflects:
“How I got here? Some luck, good choices and a lot of really hard work.”
Maya has taken each phase of her career, each obstacle in the jungle gym, as a stepping-stone to her next role. As the challenges in cyber are in constant flux with ever-evolving threats, the field needs the agility of people who are driven by change.
Taking on cyber security’s unknown unknowns
Karin D’Amico, former Corporate Information Security Officer at Givaudan
The former US Secretary of Defence, Donald Rumsfeld, famously said: “there are unknown unknowns – the ones we don't know we don't know. And if one looks throughout the history of our country and other free countries, it is the latter category that tend to be the difficult ones.” In cyber security, there seem to be more unknown unknowns than in any other field. And although this may seem like common knowledge today, 20 years ago – when there was no such thing as security departments or even cyber security degrees – this statement may not have been so widely accepted. Karin, former Corporate Information Security Officer at Givaudan, was one of those who was able to appreciate this aspect of cyber security early on and successfully built her career with it in mind.
“It all started when I was working as an executive administrative assistant and my boss saw that I was hungry for new challenges. He also saw that I had a particular interest in IT, so he started to give me more tasks in that area and encouraged me to move into a position as IT Support Manager. A few years later, I obtained a diploma in IT project management while working as a consultant for Givaudan.
At the beginning of my career in IT as a network and server engineer, security was not at the top of any company’s priority list; the security topic at that time was the chase of some of the first viruses. Over time, security projects started to come in, little by little, with broader scope and higher ambition. Given my experience in project management and IT infrastructure, I was given the responsibility of managing Givaudan’s first global security project, which was to set up a corporate antivirus system. It’s amazing to think that, back then, not having such an antivirus was the norm! After that project and as Givaudan’s needs for security experts grew exponentially, so did my interest and competencies in the field.
When I was on maternity leave after the birth of my second child, I received a call from my boss, Givaudan’s then CISO. He had received a great opportunity to work on a big integration project and asked me if I would be willing to take over from him; which, of course, I was. As I started in this new role, I decided to pursue information systems security studies to enrich the expertise I acquired in the field by working on security initiatives."
Having been actively involved in Givaudan’s security team from its very early days, Karin was one of those who was able to appreciate the existence of cyber security’s unknown unknowns and developed a highly effective coping strategy built on three pillars: continuous improvement, knowledge of the business and a strong focus on stakeholders.
Progress one step at a time
Cyber security is an arms race; in this field, keeping up with the pace of changes requires continuous improvement:
“You need to take the time to identify what is most important to your organisation and improve its maturity one step at a time.”
This is how, over 10 years, Karin raised Givaudan to a firm with a comprehensive and coherent cyber security programme.
Know the business inside out
Being able to secure a business requires a deep knowledge of that business.
“You need to get to know the company, from different angles and perspectives”.
Knowing the business also means understanding its people and their ways of working. Karin fondly recalls learning to adapt her Swiss mentality – where being on time means being five minutes early – to a more international approach. For Karin, it is also crucial to take into consideration the organisation’s maturity level and risk appetite when implementing new processes and tools. She argues:
“The latest technology is not necessarily the best; I always put these considerations in the context of the company, the industry and the people before making an important decision”.
Invest time in getting key stakeholders on board
“Security is a collaborative effort; it’s not only the IT or security team’s problem. It’s important for everyone to understand that”.
In any organisation, it’s not surprising that employees don’t want their daily tasks and creative processes to be disrupted by having to put their passwords in three times. So it’s important to appreciate that and find the right solution to keep the firm safe while maintaining a good employee experience.
What we can learn from Karin is that CISOs have an enterprise-wide responsibility. They are responsible for building up their organisation’s lifeline: the tools and processes that will keep them safe in the long run. Ultimately, cyber security leaders cannot predict the future, but Karin is the perfect illustration that preparation is the next best thing:
“Nobody is born an expert; but those who put in the effort will be rewarded.”
From math to cyber security - a conventionally unconventional journey
Patricia Egger jump-started her career in cyber security armed with a curious mind, an affinity and passion for the subject but without a typical computer science degree. We interviewed her about her journey to cyber, what inspires her about her job at Deloitte and the cyber security profession.
"I’m a mathematician who’s passionate about people. My first exposure to security was in a cryptography course I took in high school. Later at university, I loved that crypto had its roots in some pretty complex math, but at the same time, was used by everybody, every day. That’s what keeps me going today: the relationship and dependencies between the science of security and people. What some may not realise is that security is as much of a technical and technological topic as it is a human topic; and I think that’s what makes the field so interesting.
After my first year at Deloitte Cyber Risk Services, I can say that I have never felt bored. I have been able to work on interesting and complex client projects, spanning from identity and access management to privileged access management and cyber security risk assessments, which provided valuable learning experiences.
In addition, I also have the opportunity to lead the Swiss chapter of Deloitte’s EMEA Women in Cyber initiative and as part of that the Women in Cyber Leadership interview series, that aim at reducing the gender imbalance in the field of security, a cause I care deeply about. Being part of a Women in Cyber team that contributes to changing the perception of the cyber security industry from the ‘hoody-wearing hacker in the dark room’ to a career with exciting opportunities that do not require a computer science background, is incredibly motivating. Supported by both my senior management and my peers, I have been given a platform to make an impact that matters; a privilege that I do not take for granted. "
Outside of Deloitte, Patricia also encourages girls and young women to explore the tech and security field by giving personal insights into her experiences and her work at various bootcamps and events.
Building a secure digital world is a legacy we owe future generations
Prof. Dr. Solange Ghernaouti, Director of the Swiss Cybersecurity Advisory & Research Group and Professor of Cyber Security at the University of Lausanne
The image of cyber security relying on lone hoody-wearing teenagers hacking in the dark needs to change. In reality, to improve cyber security, engineers, lawyers, economists, criminologists and policy makers need to collaborate to address cyber threats with comprehensive strategies. Prof. Dr. Solange Ghernaouti, Director of the Swiss Cybersecurity Advisory & Research Group, President and Founder of the SGH Foundation - Social Good for Humanity and Professor of Cyber Security at the University of Lausanne, has found success in building her career on such an interdisciplinary approach.
“During my PhD and the first years of my professional career, I gained experience in most areas of computer science, such as databases, operating systems, programming, electronics ands telecommunication networks. I discovered a particular interest for networks and technical network security and quickly realised that technical security would never be enough; vulnerabilities will always remain. This led me to study network management, a field that I found particularly fascinating and still do. That realisation brought me to focus on cyber risk management and I joined the University of Lausanne’s business school as professor.
As a consequence of wanting to better understand cyber criminals’ motivations, I started exploring the field of criminology. Then, understanding that politics and the economy are what make the world go round, I started becoming active in those aspects as well.
Throughout my studies and career, the trust I received meant a lot to me. For example, before starting my PhD, my advisor told me that if I wanted to graduate with him, he expected me to teach him something. The fact that this expert believed that he could learm from me powered my will to do good research and not disappoint him. I had a similar experience when writing my first book. I had never done anything like that before and didn’t know where to begin. Having the editor’s trust and support went a long way in helping me achieve that milestone in my career.”
As our society becomes increasingly digitised and connected, more security requirements and challenges naturally arise. Solange, who has been involved in the development of cyber security technology, standards and policies from their early years, believes there is still a lot of work remaining to improve the current state of cyber security and to create a safer world for future generations. Solange explains: “If we want to serve the common good, think about our youth’s future and the legacy we will leave behind, we should care much more about cyber security, including data protection, mass surveillance and the means we will use to address these issues”.
When asked why we are struggling to keep safe in the digital realm, Solange points out: “The biggest mistake we are making is thinking that technology alone can solve a human problem with socio-economic and political entanglement. Technology can help to solve certain issues, but it can also create others.” According to her, there are three critical obstacles in the way of robust and effective cyber security:
- A lack of cyber security awareness within the general population;
- Insular cybersecurity measures that fail to comprehensively address complex cyber risks; and
- Insufficient collaboration on national and international scales due to the fear of reputational damage in case of a security incident.
Let’s take a closer look at each one of these obstacles.
Lack of cyber security awareness
“How many campaigns or public service announcements related to cyber security risks have you seen in Switzerland recently? None? Exactly.”
Solange currently sees a paucity of resources and funds dedicated to cyber security on a federal or cantonal level in Switzerland. Solange believes that our authorities and the private sector need to invest in educating all of their citizens in cyber security risks.
Solange sees a power imbalance between those that control and those that use technology and strongly disagrees with claims that our children will all naturally be digitally fluent and security aware. She believes that we must adapt our education systems to the increasingly digitised world around us if we want to develop proper digital skills: “Having children use tablets in schools is not enough! Students need to be taught how to programme; not only to create new applications, but also to de-code what is happening within the devices we use every day.” She believes that awareness is the first step in understanding the long-term consequences of our word’s digital transformation.
Solange may be onto something, and not just for youngsters. How many of us can say we understand how our everyday tools work, be they SAP, Facebook or even email services? Today, most of us use these as black boxes, not knowing how they function and make use of our data.
Insular cyber security measures
“There is a certain over-confidence of technical people with regard to others with non-technical backgrounds; similar to lawyers and non-lawyers, doctors and patients.”
This can make collaboration tricky amongst experts in engineering, law, politics, social sciences, industry and research.
Instead of seeing cyber security as an issue that only engineers can solve, Solange argues that we need to recognise and value a wider variety of professional experience as well as education. For example, professionals should have the opportunity to complement their existing work experiences with courses to obtain specialised technical, managerial or legal skills.
Solange cites understanding the need for surveillance and intelligence as well as that of the fight against cybercrime as challenges where a variety of different skills are essential. Solange is very clear about this: “It’s not reasonable to assume one single profile can cover all facets of these complex issues and diverse expertise and experience ads significant value in cyber security.” This is why she believes that an integrated approach to cyber security is vital for our society and that efforts should stretch beyond traditional boundaries, whether they be geographic, political, military-civilian, left-right, black-white-purple. According to Solange, there is an urgent need to overcome conventional political divergences if we want to master cyber risks.
No company wants to grace the pages of newspapers because they fell victim to a cyber attack or because they produced or used vulnerable technologies or services. However, the reality is that major breaches occur regularly and there are many lessons to be learned from vulnerability disclosures:
“We should not let the fear of reputational damage stop us from sharing these lessons learned and hinder our progress towards true cyber security, but instead should understand the benefits in sharing knowledge, expertise and experience.”
To overcome this obstacle, there needs to be more encouragement from the top, be it from regulators or the government. In addition, processes and tools such as anonymised reporting and privacy-preserving data sharing must be developed to enable and encourage companies and people to share valuable information while protecting data subjects’ privacy.
Reflecting on Solange’s career path and her views, it is clear that greater collaboration from all relevant areas of expertise is in everyone’s best interest. We all have a stake in cyber security; it’s an issue that we as a society and individuals cannot ignore. We all need to work towards security in cyberspace and the physical world. Although the path to true cyber security may be long and at times tedious, Solange keeps a pragmatic and positive attitude: “We might as well enjoy the ride!”
EMEA Women in Cyber
Women are still underrepresented in the global cyber security workforce. What can organisations do to bridge this gap?
Cyber security has become one of the hottest and fastest-growing fields in technology across the globe today. Despite the continuous growth in cyber security spending and opportunities, women’s representation in the cyber workforce remains low - even more so than in IT. This is against a backdrop of a growing skills shortage in cyber; by 2022 there could be a global deficit of 1.8 million cyber security professionals.
How can organisations begin to bridge this gap? One way is to encourage more women in to cyber security; another is to offer them equal opportunity to rise to senior leadership roles. At Deloitte, we are committed to addressing this gender imbalance, which is why we launched our EMEA Women in Cyber initiative. By collaborating across EMEA, internally and with clients, we aim to promote gender diversity in the cyber security industry and work towards closing this gap. Watch the space below for regular updates on all activities.
Stories & insights
Our EMEA Women in Cyber vision
We want to make an impact far beyond our internal Deloitte Cyber team. To do so we have developed the Deloitte Women in Cyber initiative over the last three years and are now working collaboratively across EMEA with a common vision for the future:
To promote gender diversity in the cyber security industry by initiating the dialogue, creating awareness and fostering a community that inspires female talent to consider a career in cyber.
In order to achieve our objectives, we must influence and shape the minds of individuals to understand that the cyber security industry is open to anyone regardless of backgrounds, education or gender. We must harness our current talent to ensure we have a rich pipeline of females ready to step into leadership roles and raise awareness of how successful diverse teams can be.
Phill leads the Cyber Risk Services practice for Deloitte in the UK and is the Global Cyber Talent Partner. His background is in the planning and execution of major change programmes within IT organisations to transform their efficiency, effectiveness and linkage to business strategy. Contact Phill if you would like to know more about the benefits of diversity and the Deloitte’s Women in Cyber initiative.
Lisa R Hamilton
Lisa is a Director within Deloitte’s Cyber Risk Services practice and leads the EMEA Women in Cyber Initiative. She has over 12 years’ experience with a focus on financial services. Contact Lisa for more information or if you would like to get involved in Deloitte’s EMEA Women in Cyber initiative.
Hannah is a Manager within Deloitte’s Cyber Risk Service practice and leads the EMEA Women in Cyber initiative with Lisa Hamilton. Her experience focusses on leading security and privacy assessments, operational risk management and delivering privacy transformation programmes, with a strong background in learning development. Contact Hannah if you would like to learn more about the initiative or how you can become involved in it.