{"id":107843,"date":"2020-03-18T15:00:43","date_gmt":"2020-03-18T22:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=107843"},"modified":"2020-04-21T14:14:50","modified_gmt":"2020-04-21T21:14:50","slug":"cyber-canon-insecurity","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/03\/cyber-canon-insecurity\/","title":{"rendered":"Book Review: \"InSecurity\""},"content":{"rendered":"<p><b>Cybersecurity Canon Candidate Book Review: <\/b><span style=\"font-weight: 400;\">\u201cInSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe,\u201d by Jane Frankland (Published October 20, 2017)<\/span><\/p>\n<p><b>Book Reviewed by:\u00a0<\/b>Greg Day, CSO EMEA<\/p>\n<p><b>Bottom Line:<\/b> <i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Smart leaders build smart teams around them, yet the percentage of women in the cybersecurity industry is still low today. Are you missing out on hiring top talent due to unconscious biases? Do you lead an environment to nurture and develop diverse talent from differing educational and cultural backgrounds? Are you a parent wondering what skills your children need for tomorrow's digital world?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Jane Frankland, author of \u201cInSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe,\u201d clearly spent significant time gathering real-world examples around the challenges of diversity, and she shares great guidance and advice. This book is aimed at women specifically, but its insights would be useful for any minority group. \u201cInSecurity\u201d will also be of interest to managers, leaders, parents and anyone wishing to encourage others to live up to their potential. Frankland logically works through the challenges, from identifying, hiring and educating to retaining talent, and it ends with calls to action.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some may wonder why I wanted to review this book and why you should read a book on gender diversity in cybersecurity. Some may see this as simple awareness of the modern world we live in, yet the fact is that today, in the technology industry \u2013 and cybersecurity specifically \u2013 we have a shortage of skilled staff, yet nearly half the adult population is not seeing cybersecurity as a viable career option. Why is that, and how do we change this? There is a whole talent pool of experienced and skilled workers we simply must do better at tapping into.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In recent years, there has been a push (certainly in the UK) to increase science, technology, engineering and maths (STEM) in the education system. \u201cInSecurity\u201d focuses on why this isn't enough and looks at many aspects of how to encourage, nurture and support diversity in the workplace, starting with STEM. One aspect I would highlight is the inclusion of arts \u2013 yes, arts \u2013 in STEM to make it \"STEAM.\u201d The logic here is that arts drive creativity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This makes a world of sense for several reasons. Firstly, so much of cybersecurity is about thinking outside the box. Adversaries succeed when they are able to think of creative ways to compromise systems that the cybersecurity experts simply hadn't thought of. During my career, I have both hired and worked with great security experts that have come from a variety of different backgrounds, including a former priest, juggler and musician. As such, the second point is that while formal education is a helpful start, we should never rule out those who have come from different backgrounds and are switching into cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As Frankland highlights, one of the other most common reasons attackers are successful is compliance failure. It's an easy step to infiltrate the accounting and auditing department, for example, and move across the network. This highlights why this book is for everyone to read; the more we open our minds to opportunities, the better our security teams can be.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In recent years, I completed a \u201cdiversity in hiring\u201d training. Probably the most valuable thing I took away from this was the concept of unconscious bias. Like it or not, we all have this. It's part of our persona, the life experiences that define who we are and how we act. If you haven't come across this concept, it\u2019s the language we use, the way we act without conscious intent. For example, when writing a job spec, does it include language based on your own experiences that would make the role less appealing to people who don\u2019t share your life history. It\u2019s natural we look for traits in others that we have ourselves \u2013 does this make men more likely to hire men? The book highlights an example I had heard previously where conductors were hiring more men into orchestras, possibly due to unconscious bias. They then started doing blind music auditions and there was a notable shift.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like so many things in business, addressing this issue starts with having the knowledge (hence my recommendation on reading the book). It also helps to have a diverse team (did I say already\u2026 read the book!) that can support your efforts by providing input into the hiring process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hiring may be step one, but in an industry where it's typical to shift companies every two to four years, managing diversity is even more critical. The book shares a broad range of reflections on both the inhibitors many have faced, as well as some very practical tips on how to nurture and develop staff, relative to their personalities. In what is such an exciting and dynamic space, it's shameful that anyone should have to work in an environment that doesn\u2019t inspire passion for their work and challenge them to grow as individuals. The challenge is ensuring all team members are provided with an environment in which they feel they have a voice. STEAM brings creativity to cybersecurity and diversity brings differing perspectives that create a more well-rounded and balanced view.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In life, we strive to further ourselves through knowledge and self-awareness. \u201cInSecurity\u201d is all about building our awareness of others, which is just as important. In a world where the demand for technology skills continues to grow, this book highlights why we\u2019d be hugely remiss if we don't explore, nurture and develop the talent of every possible person who can support us on the digital transformation journey.<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cInSecurity\u201d by Jane Frankland highlights the importance of developing the talent of all people who can support the cybersecurity industry.<\/p>\n","protected":false},"author":150,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[251,4270],"coauthors":[1466],"class_list":["post-107843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=107843"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107843\/revisions"}],"predecessor-version":[{"id":107928,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107843\/revisions\/107928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=107843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=107843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=107843"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=107843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}