Story image

AU woman fakes CV to get $245k CIO salary, but gets sacked instead

06 Feb 18

The IT skills shortage in Australia is bad enough without having to factor in potential fraud.

News broke recently of the sacking of former chief information officer of South Australia’s Department of Premier and Cabinet, Veronica Theriault.

The reason? She allegedly faked a resume that claimed previous employment at a handful of large technology firms, in addition to a number of university degrees, to claim the substantial $245,000 per annum job.

Theriault was let go after seven weeks when her employers realised they’d been deceived. After being charged by the state’s corruption watchdog, Theriault appeared in the Adelaide magistrates court recently and is expected to enter her plea in the case when she next appears in court on April 19.

The vacant CIO position has since been restructured into a chief technology officer role and filled by Abhishek Singh after being drawn from the South Australian department of finance in his former role as the head of business and IT.

Singh is to be joined by Dr Eva Balan-Vnuk (formerly Microsoft SA state leader) who will be assuming the role of executive director of ICT and digital government after the woman formerly in the role reportedly quit over the Theriault scandal.

Affix founder and managing director Jarrad Skeen says people should never fake anything on their CV as they will get caught and the consequences will be severe.

“We see embellishment on CVs all the time in the tech industry. The most common example is candidates embellishing their skills and using every acronym in the hope that they appear in search engines, even when they've never had any experience with what they're listing,” says Skeen.

“We’ve also encountered extreme cases of fake CVs. You’ll always eventually be caught as the Australian market is small and with the rise of social media, it’s easier than ever before to verify claims.”

Skeen says it’s much better to have an honest self-assessment of your skills and develop in the areas you want to go.

“CVs are also becoming less important as public profiles on sites like LinkedIn replace their relevance. If you’re faking a public profile, you will quickly be exposed because co-workers and employers may challenge your claims,” says Skeen.

“Instead of reference checking at the end of the process, we reference check before we shortlist to remove any risk of emotional bias."

Skeen says too many companies and government departments fall into the trap of going through the shortlist and interview process and then treat the reference check like a compliance exercise.

“At that point, you’re emotionally invested and think you’ve found the right candidate, you might have invested four hours or more in meetings with them, so if the reference check highlights a red flag it might not be investigated properly and taken seriously,” says Skeen.

“Then it’s found out once the candidate starts the job and causes a much bigger issue.”

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Verifi takes spot in Deloitte Asia Pacific Fast 500
"An increasing amount of companies captured by New Zealand’s Anti-Money laundering legislation are realising that an electronic identity verification solution can streamline their customer onboarding."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.