About
By the time I was 29 and as a single mum, I'd built my own 7-figure global business. I…
Services
Articles by Jane
Contributions
Activity
-
Cybersecurity Unplugged with Defendify's Glen Capen , Ashley McMurry and Bob Carver. In this no holds barred webinar, top security influencer Bob…
Cybersecurity Unplugged with Defendify's Glen Capen , Ashley McMurry and Bob Carver. In this no holds barred webinar, top security influencer Bob…
Liked by Jane Frankland
-
I'm thrilled to announce I'll be speaking at the UK edition of the Cyber Leaders' Summit, taking place this November in Manchester! The summit…
I'm thrilled to announce I'll be speaking at the UK edition of the Cyber Leaders' Summit, taking place this November in Manchester! The summit…
Liked by Jane Frankland
Experience
Education
Licenses & Certifications
Volunteer Experience
-
Consultant
Give01Day
- Present 10 years 4 months
Science and Technology
Give01Day is UK's first initiative that brings volunteering professionals and charities together. The platform enables professionals to donate their time to help charities with their cyber security issues.
Charities hold extensive personal and sensitive information about their clients, supporters as well as employees, but they lack the resource expertise to adequately protect this information. In trying to maximise their support reach for front-line clients, they are vulnerable to trust…Give01Day is UK's first initiative that brings volunteering professionals and charities together. The platform enables professionals to donate their time to help charities with their cyber security issues.
Charities hold extensive personal and sensitive information about their clients, supporters as well as employees, but they lack the resource expertise to adequately protect this information. In trying to maximise their support reach for front-line clients, they are vulnerable to trust and reputation in cases of cyber attacks as well as legal damages (in cases privacy and data protection insufficiencies).
Publications
-
IN Security : How a failure to attract & retain women in cyber security is making us all less safe
RETHINK Press
Women are fundamentally differently to men and, when it comes to cybersecurity, one thing is certain...IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE.
Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk averse, compliant with rules, and embracing of organisational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm…Women are fundamentally differently to men and, when it comes to cybersecurity, one thing is certain...IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE.
Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk averse, compliant with rules, and embracing of organisational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm during times of turbulence – a trait that’s required when major security breaches and incidents occur.
As cybercrime, terrorism and warfare is increasing, and the number of women in cybersecurity is declining, now is the time to take action. By combining stories, interviews and data with practical advice, the golden rules and checklists, IN Security provides the means to turn things around.
When you read this book you’ll understand why the numbers of women have fallen along with strategies for attracting, identifying, and retaining more women in cybersecurity. This book is essential reading for anyone in cybersecurity or looking to get into it.
The book can be bought on Amazon here - https://www.amazon.co.uk/dp/178133269X.
Courses
-
IN Security Business Accelerator
2017
-
IN Security Personal Branding for CISOs
2017
-
IN Security Personal Branding for Women
2017
Honors & Awards
-
Top 50 Influencers In Tech
The Awards Magazine
https://www.theawardsmagazine.com/top-50-women-in-tech-influencers-to-follow-2021/
-
Top 50 Influencers in Tech
Engati
https://www.engati.com/blog/women-in-technology
-
30 Most Inspiring Women in AI
Engati
https://www.engati.com/blog/top-women-in-ai
-
Security Leader of the Year
Women in IT, UK
“This nominee uses her experience and platforms to expand awareness and diversity in the cybersecurity arena and is rightfully recognised by the tech world for her efforts. She is an entrepreneur who has succeeded in a male-dominated field, and she has championed women’s progress in cybersecurity through her scholarships, mentoring and writing. She is a leader in this field due to her hands-on and advisory work and because she is a visible role model for others to follow. She has demonstrated…
“This nominee uses her experience and platforms to expand awareness and diversity in the cybersecurity arena and is rightfully recognised by the tech world for her efforts. She is an entrepreneur who has succeeded in a male-dominated field, and she has championed women’s progress in cybersecurity through her scholarships, mentoring and writing. She is a leader in this field due to her hands-on and advisory work and because she is a visible role model for others to follow. She has demonstrated diverse, innovative approaches across various sectors and organisations that all seek to challenge the status quo of her industry, with measurable impact at scale. This year’s winner cultivates an environment of self-improvement, learning and knowledge sharing wherever she goes.”
-
Cyber Citizen of the Year
The National Cyber Awards
The top award for outstanding contribution to the world of cyber security and protection. Our winner receives a unique Golden Cyber Citizen trophy.
-
Unicorn Awards, Top 100
Cyber Defense Magazine
-
Global Digital Ambassador
World Assessment Council
-
Outstanding Contribution
SC Awards
-
Tech 500 Power List 2019
Tyto
(in the 100 list) https://tytopr.com/tyto-tech-500-power-list-2019/
-
SC Top 50 Women of Influence (UK)
-
-
Top 25 Women in Cybersecurity, 2019
Cyber Defense Magazine
-
Tyto Tech500 Power List
Tyto
Made the 100 list https://tytopr.com/tyto-tech-500-power-list-2019/
-
UNESCO Trailblazing Women in Tech
UNESCO
https://en.unesco.org/galleries/remarkable-women-technology-leaders
-
LinkedIn Top Voices 2018
LinkedIn
To compile the list, the editors partnered with the LinkedIn Flagship Relevance team to uncover today’s most engaged — and engaging — members around the world in key segments. It’s no easy task, considering the competition: there are over 500 million people on LinkedIn and over 2 million posts, videos and articles a day to view along with tens of thousands of comments every hour — all generating tens of millions more shares and likes. Only 342 people are picked, and out of 25 that are from the…
To compile the list, the editors partnered with the LinkedIn Flagship Relevance team to uncover today’s most engaged — and engaging — members around the world in key segments. It’s no easy task, considering the competition: there are over 500 million people on LinkedIn and over 2 million posts, videos and articles a day to view along with tens of thousands of comments every hour — all generating tens of millions more shares and likes. Only 342 people are picked, and out of 25 that are from the UK, I was the only writer to be selected from cybersecurity.
To find standout voices, LinkedIn use a combination of data and editorial signals. They screen for engagement among professionals sharing in their area of expertise, looking at what kind of conversations — measured by engagement, including comments and re-shares — their original content is creating. They track relative follower growth, too: Are these professionals attracting dedicated fans in their particular sector? Finally, they emphasize quality and diversity; the list should reflect the world we work in. All activity measured took place over a 12-month period, from mid-September 2017 to mid-September 2018, and as with all LinkedIn Lists, they exclude LinkedIn and Microsoft employees from consideration.
Regardless of industry or location, the Top Voices follows a similar formula to cultivate powerful communities: consistency, depth of insight and a desire to deeply engage with others. On average, Top Voices are 2X times more likely to respond to comments or reply to another member’s post. Compared to all members sharing in 2018, the Top Voices received an average 7X more comments, 10X more likes and 5X more shares on their posts, articles and videos. -
SC Top 50 Women of Influence
SC Magazine
-
Top 20 Global Influencer
IFSEC
Ranked the 17th most influential person in the world for cybersecurity.
-
Cyber Security Diversity Champion
Cyber Security Awards
Rewarding talent and innovators in cyber security.
-
Top 5 UK Influencer
IFSEC
Ranked the 3rd most influential person in the UK.
(https://www.ifsecglobal.com/global/top-50-influencers-security-fire-2017-cybersecurity/) -
TechWomen50
We Are Tech Women
https://wearetechwomen.com/tag/techwomen50/page/12/
-
peopleHum Top 200 leaders to follow in 2021
peopleHum
Listed as the top #25 people to follow
Organizations
-
Insititue of Sales & Marketing Management (ISMM)
-
- Present
Recommendations received
31 people have recommended Jane
Join now to viewMore activity by Jane
-
"Cybersecurity as an industry is dominated by males. When I entered the field not so long ago – about a decade ago – there weren’t a lot of women in…
"Cybersecurity as an industry is dominated by males. When I entered the field not so long ago – about a decade ago – there weren’t a lot of women in…
Liked by Jane Frankland
-
Knowledge without application is dust. Transformation begins internally before it can be applied to culture.
Knowledge without application is dust. Transformation begins internally before it can be applied to culture.
Liked by Jane Frankland
-
Despite train delays today has been a breath of fresh(ish) air beyond the four walls of my home office. I attended the Avanade analyst event (thanks,…
Despite train delays today has been a breath of fresh(ish) air beyond the four walls of my home office. I attended the Avanade analyst event (thanks,…
Liked by Jane Frankland
-
This is from the Barnes & Noble, Inc. on 5th Ave in New York. They started that display on Oct 15 and it’s been amazingly successful! I get a bit…
This is from the Barnes & Noble, Inc. on 5th Ave in New York. They started that display on Oct 15 and it’s been amazingly successful! I get a bit…
Liked by Jane Frankland
-
Dear criminals, sorry about stopping your 36 million BEC attacks a year. Oh wait, no we're not. #sorrynotsorry Secure your organization with an…
Dear criminals, sorry about stopping your 36 million BEC attacks a year. Oh wait, no we're not. #sorrynotsorry Secure your organization with an…
Liked by Jane Frankland
-
What I’m about to say might ruffle some feathers 🪶... As the CEO of HACKERverse.ai and a fierce advocate for women in tech, I’ve made a decision…
What I’m about to say might ruffle some feathers 🪶... As the CEO of HACKERverse.ai and a fierce advocate for women in tech, I’ve made a decision…
Liked by Jane Frankland
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jane Frankland
-
Jane Frankland
Broker/Realtor/Managing Broker at Bean Group Real Estste
-
Jane Frankland
Senior Research Fellow at University of Southampton
-
Jane Frankland
Real Estate Broker at Bean Group
-
Jane Frankland
Trademark Specialist at RatnerPrestia
8 others named Jane Frankland are on LinkedIn
See others named Jane Frankland