Difficult: Attracting Women To Cybersecurity

Cybersecurity is a male-dominated field. Women make up only 10% of the global cybersecurity workforce. The field is missing out on a lot of capable people and women are missing out on an interesting, well-paid career path. There have been numerous initiatives trying to change the situation, but fighting existing stereotypes has proven to be hard.

The underlying problem: society still views technology as a ‘boy thing’. Boys are the inventors, the hackers, the tinkerers. We don’t expect girls to have the same interest in building the cool stuff. They are expected to be better at soft skills like empathy, talking and feelings.

These expectations still drive girls toward people-focused careers and away from science and technology, despite all efforts. Or perhaps, ‘despite’ isn’t the right word here…

Don’t Focus Tech

There are several articles that aim to get girls interested in a career in cybersecurity. But even those articles can’t avoid that tech-avoidant girly girl stereotype from popping up from time to time.

It is very telling that the tech part is often assumed to be the ‘bad’ part. It is the part that needs to be sugarcoated somehow. Yes, it is somewhat reluctantly admitted that the field has its roots in technology. But these roots are to blame for the field’s poor reputation. The articles try to lure attention away from this ‘bad’ part by repeating over and over again that the field is so much more than ‘just tech’.

They keep going on about how the field needs to broaden its definition beyond the technical domain and that it is such a misconception to think that cybersecurity is only about keeping information and computers safe. Girls shouldn’t think that the domain is highly technically focused. They must know that cybersecurity is so much more than ‘hacking and passwords’. It is a multidisciplinary field, and if you don’t like tech, there are plenty of non-technical areas to go into as well! And don’t worry; you don’t really need a technical background or technical skills to get a job in cybersecurity.

Looking for tech skills and technical qualifications in cyber candidates is condemned as a bad practice. It ’puts women off’ and even ‘naturally excludes’ them. Girls and tech don’t mix very well, apparently.

Female Skills Wanted

Next to the assumption that you’ll have to downplay the tech part in a career in order to sell it to women, there is the assumption that women will be naturally attracted by the ‘people part’. This is the part that gets advertised as a strong selling point.

These articles point out how professionals in cybersecurity have to deal with all kinds of different people. They argue how important it is to know a thing or two about business and organisational psychology. They stress the field’s connection with fields like behavioral science and politics. And they discuss the need for people who can serve as translators and bridge-builders. That’s where the girls come in, with their naturally superior soft skills as ‘strong communicators and collaborators’.

This is not to downplay the importance of the ‘people part’ in cybersecurity. It is just as important as the tech part. But it is very typical that in articles aimed at women, it’s this people part that gets emphasized over the tech part. This echoes existing stereotypes of tech-avoidant people-oriented females versus technical, tinkering males.

A lot of the opinions expressed in those articles come from women in cybersecurity themselves. But women can have gender prejudices too. These societal expectations are deeply ingrained in us all. And as this blog post shows, it is hard to fight them, even with the best of intentions.

In The Real World

But what if the writers of those articles have intentionally sugarcoated the tech bits? What if they know that that is the only way to get their message across? What if too much talk about tech really does scare the girls away?

The people interviewed in those articles have years of experience as an expert in the field. If there is anybody who knows what works and what doesn’t, it’s them. And probably, they’re right. Emphasizing all the different and interesting social aspects of the field is more likely to draw girls’ attention than talking about technical challenges.

But this preference is, for a large part, the result of the subtle (and not so subtle) messages society keeps sending to girls: You’re a helper, not a tinkerer. A message this kind of article keeps reinforcing.

As long as this keeps happening, things are not going to get any better. If girls keep seeing themselves as non-tech people persons first, they are less likely to choose a career in cybersecurity. Cybersecurity might be broad and multidisciplinary, but it is still a tech field. You work with tech people and you get to deal with tech-related issues. Why go into a tech field when your natural talents lie in an entirely different domain? Not even cybersecurity’s bright career prospects seem enough to change women’s minds about this.

If the field really wants to get more diverse, playing into existing preferences (and reinforcing them) isn’t enough. It’s those preferences themselves that need to be changed. Of course, that is going to be a hell of a job. But unfortunately, no one said that changing the world was going to be easy…

What do you think? Is it realistic to expect those preferences to change anytime soon? Or should the cybersecurity field accept gender preferences as they are today and play into those preferences in order to attract a more diverse workforce?

Medium:      Women In Cybersecurity:


 

« State Sponsored Hackers: Finding The Country Behind The Attack
Cybersecurity Start-Ups Working With GCHQ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.