For years, the world’s largest corporations have outsourced their cybersecurity to the
The Go-To Bridge Between Cybersecurity Brands & Leaders
Hi, I'm Jane!
I'm guessing someone you trust has mentioned my name. Or maybe you've read my books, heard me speak at a conference, or even stumbled upon one of my blogs, videos, TV or radio appearances. Whatever your path, I'm looking forward to helping you get you the results you’re after. With almost three decades of experience in cybersecurity, numerous awards and an MBE for contribution to the industry, I know I'll add value. And, I’m excited to unlock new levels of trust, visibility and traction in this noisy, high-stakes landscape.
On this page, you'll find a quick overview of the ways you can work with me so you can find exactly what you need and we can start working on something incredible. And if you want to learn more about me – my personal story and guiding philosophies hit the button below.
What's At Stake?
You’re in cyber to make an impact — but the game has changed. CISOs want more than survival. They want clarity, influence, and a seat at the table — not just a call after a breach. They’re building teams and driving strategy, but their work often goes unseen, their voices unheard. And when vendors blend into the noise, trust breaks down.
On the flip side, vendors are trying to cut through — with products that genuinely help. But CISOs are tired of being sold to. They want insight, credibility, and real relationships.
That’s where I come in. Trusted by cybersecurity leaders and hired by the vendors who serve them, I bridge the gap.
- For CISOs: I help you grow your visibility, influence, and leadership.
- For vendors: I help you earn trust — so CISOs engage, not ignore.
If we don’t fix this gap now? CISOs stay unheard. Vendors stay invisible. Cyber resilience stays out of reach and the world suffers. But when we get it right —cybersecurity becomes strategic. Solutions get adopted. Leaders rise. And everyone wins.
-
1Avoid wasted effort.
Stop burning time and budget on strategies that fall flat — whether you’re selling solutions or trying to lead them. -
2Ditch the disconnect.
Eliminate the frustration of not being heard, seen, or trusted — whether you’re a vendor ignored by CISOs, or a CISO buried by noise and pressure. -
3Gain influence, credibility, and traction that moves the needle.
Whether you’re a brand trying to reach decision-makers or a leader trying to shape the future of security — I help you get clear, get trusted, and get results.
Why Work With Me?
I don’t just care about cybersecurity — I care about the people shaping it. From founders to CISOs, I understand the pressure you’re under — to be heard, trusted, and deliver results. With 1,000+ clients, 600+ leaders mentored, and 20+ years in the industry, I know what works — and what doesn’t. I’ve helped brands grow trust. I’ve helped CISOs grow influence. And I can help you, too.
How I Can Help You
Choose from these solutions, access more detail here, and if you need something bespoke, book a discovery call.

BRAND PROMOTION
I help cybersecurity brands earn trust, engagement, and credibility with CISOs and IT leaders. As a recognised industry voice, I cut through the noise and create real traction with the buyers you care about - from thought leadership content to impactful talks, panels and media opportunities.

ADVISORY
As a board and ExCo advisor, I provide guidance on direction and strategy. I bring a unique perspective and am dedicated to delivering results that bring organisational success and stability.

CISO INFLUENCE
Coming soon, a high-impact program designed to help CISOs grow visibility, credibility, and influence — so they become the trusted leaders others follow, inside and outside the boardroom.
How To Work With Me
Please follow these next steps to complete the process
Book a Discovery Call.
Tell me about your goals — whether you’re trying to build brand trust or grow leadership influence. Get clarity on what you need and how I can help. This allowed us to establish if we’re aligned.
Choose the Right Service.
From influencer partnerships to advisory or speaker bookings — I’ll tailor a solution that fits your impact goals. Get a clear plan, built around results and relationships
Build Trust. Grow Influence. See Results.
Launch with confidence and start seeing the traction, engagement, and credibility you’ve been chasing. Stand out. Be trusted. Create real momentum.
FAQ
That’s exactly why I’m here. I help translate complex solutions into clear, compelling value CISOs care about — without dumbing it down. Whether you’re focused on IAM, OT security, or emerging tech, I’ll help you cut through the noise.
👉 You get messaging that connects — and converts.
It’s not self-promotion. It’s leadership. In today’s landscape, trust and visibility go hand in hand. I’ll help you build a presence that’s authentic, respected, and career-elevating — without ever compromising your integrity.
👉 You become known for what matters — and doors start to open.
Neither do I. My work is fast, focused, and designed to deliver clear outcomes without dragging you through bloated timelines or endless meetings.
👉 You get clarity, speed, and results that show up quickly.
Then you’re exactly who I built this for. Whether you’re entering a new market, repositioning, or just getting started — I’ll help you punch above your weight, build credibility, and attract the right attention from day one.
👉 You get traction — faster than you think.
Will you be the Next Success Story?
From time to time, I teach my influencing skills to corporate executive teams and individuals. These are bespoke sessions run over 1-2 days, with support afterwards to embed the learning lessons. I've been doing this for a decade and am the only "influencer" in cybersecurity offering this service. If you want to stand out, have your voice heard, and gain influence internally and externally then we need to talk. Head over to work with me. Learn more there and then if you think we're aligned book a discovery call.
Training Microsoft Executives on Personal Branding & Executive Presence
Jane delivered a high quality session for us and seamlessly delivered to the limitations of remote training. Her delivery was so compelling it was able to keep the global team engaged including those for whom it was the middle of the night.
Sian John MBE
Technollogy Executive at Microsoft, Security Strategist, Keynote Speaker

❝
My Philanthropic Work
From one book to a global force for inclusion, access, and cyber resilience, the IN Security Movement is on a mission to create a safer, more equitable digital world — by removing barriers and unlocking access for the brilliant minds too often overlooked. Whether you’re a woman trying to break into cyber, a young entrepreneur building something new, or part of a community that’s long been excluded, you deserve access to tools, insights, and opportunity. And that’s exactly what we’re here to give.



Making Enterprise Cybersecurity Solutions Accessible To SMEs
Thanks to funding from the IN Security Movement, we’re making enterprise-grade tools accessible at a significantly reduced cost, empowering organizations of all sizes—from micro-businesses to scale-ups—to become resilient, compliant, and confident. Find out about My Cyber Risk and our latest initiative with Cyber Monks and Mastercard.
Enabling Scholarships For Women At All Stages Of Their Career
Since 2018, the IN Security Movement has enabled more than 442 women to receive scholarships, a value approaching $800,000. By doing this, we've been able to further their education, raise their confidence and industry connections. Every year we provide scholarships and work in partnership with Black Hat, the largest information security events provider, worldwide.
Creating Safer, More Inclusive Environments For All
The IN Security Code of Conduct is a practical, evidence-backed framework designed to help event organisations attract more women and keep them safe at their events. Grounded in real-world research and developed through years of global consultation, it outlines the behaviour and attitude that can be expected adn sets a new standard for inclusion and respect at events.
They Say...
“
If you're looking to build a modern, dynamic and resilient business plan for the ever changing digital landscape then this is ihow to. I've just finished (and can't recommend more highly) the Client Attraction 10X Program. My head is swimming with so many actionable insights and tips right now, I can't wait to break it down and start applying it to my business model ASAP.
David Stranack
Entrepreneur, Information Security Awareness & Culture Professional
“
As an MC and speaker, Jane brings insight and was able to change my thinking,
Michael Meli
CISO