It was only a matter of time. When the phone call came, it felt like a simple misunderstanding. A trusted colleague asked about an urgent opportunity I’d called to discuss. My voice had convinced them, my cadence had reassured them, and my specific phrasing had sealed the deal. The only problem? I’d never made the […]| Jane Frankland
When you’re deeply entrenched in the world of thought leadership, your name, your voice, and your image spread across media interviews, conference stages, and every corner of the internet, the potential for your identity to be misused is more than a passing worry.| Jane Frankland
menu| jane-frankland.com
For years, the world’s largest corporations have outsourced their cybersecurity to the big brand consulting firms and system integrators, believing that bigger equals better. These massive providers promise global cybersecurity coverage, deep expertise, and cutting-edge technology, making them the default choice for enterprise cybersecurity solutions.| Jane Frankland
It started in a rugby box. There I was, watching the match from a VIP suite—surrounded by a handful of other cybersecurity leaders. The beers were cold, the banter flowing, but one comment cut through the noise: “Cybersecurity’s no longer about technology. It’s about sovereignty.” That stuck with me. That rugby-box insight wasn’t just banter—it […]| Jane Frankland
Most of us have heard the saying, “No pain, no gain.” For cybersecurity leaders navigating the high-stakes world of defending critical systems, this phrase takes on a whole new meaning. Pain, in this context, doesn’t have to mean the physical discomfort. Instead, it’s the uncomfortable reality of facing constant threats, adapting to a rapidly shifting […]| Jane Frankland
I froze when the question came in. If you work in cyber, you’ll know this question all too well. It’s the one that continues to resurface, both in boardrooms and at industry events:| Jane Frankland
“Amusement will outcompete information, and spectacle will outcompete arguments.”| Jane Frankland
Moving in the circles I do, I’ve noticed a concerning trend. The modern enterprise C-suite is undergoing a seismic shift—not over profits or market share, but over who leads technology, shapes strategy, and ultimately defines the future of the business. For decades, the Chief Information Officer (CIO) was the central authority on IT, overseeing infrastructure, […]| Jane Frankland
Everyone’s talking about AI aren’t they, and when I gave a keynote on Artificial Intelligence and cybersecurity recently, I relayed how the rise of AI has brought us to a pivotal moment in history—a moment brimming with both extraordinary opportunity and unparalleled risk.| Jane Frankland
Cybersecurity has entered a new era. What was once a contest of firewalls and intrusion detection, is now a high-stakes game driven by AI. On one side, defenders are using AI to predict, prevent, and respond to cyber threats with precision. On the other, hackers are harnessing the same technology to outpace defences, sharing AI-enhanced […]| Jane Frankland
It’s the May Bank Holiday, and as I sit at my desk, working, unanswered questions continue to swirl around the recent cyberattacks on Marks & Spencer (M&S), the Co-op, and Harrods, leaving the full scope and implications of these breaches uncertain.| Jane Frankland
Music and sports have always had the power to unite us. They transcend differences, bring people together, and remind us of the beauty in being different. But if we switch our focus to the world of technology, we seei a starkly different picture—a landscape increasingly shaped by control, compliance, and automation.| Jane Frankland
Imagine building a house on sand or precariously stacking blocks in a game of Jenga. No matter how carefully you place the materials or how advanced the tools you use, the structure is doomed to collapse without a strong, stable foundation.| Jane Frankland