Diversity In Cyber Security

Improving the diversity of the cyber security industry by hiring people from different backgrounds will allow information security teams to think and defend against concepts and attack methods they have never thought of before and significantly improve your organisation’s cyber online defenses.

Digital systems are a part of Britain's critical national infrastructure, and keeping them secure and resilient is more vital than ever. The NCSC Report on Decrypting Diversity details how over 85% of professionals working in cyber security are white, compared to under 15% from black, Asian or mixed ethic groups.

The Director of GCHQ Jeremy Fleming, recently told Britain’s largest forum on cyber security, CyberUK 2021, that “the UK will only be able to thrive in the digital era if we are able to draw people from all backgrounds to work together on these problems. Inclusion has become mission critical, not a nice to have... It’s vital to our intelligence and cyber security work. It’s not just the morally right thing to do, it’s smart business.”  

Two-thirds of the industry identifies as male, compared to 31% identifying as female, while over 84% of those surveyed identify as straight, compared with 10% who identified as LGBT. 

The NCSC Report says that, “over 40% of Black cyber security professionals feel they have experienced discrimination over their ethnicity in the past year. There are other, equally shocking, examples. They should be a source of deep shame for all in the industry, the kind of stark accounts which simply cannot be ignored.”  Not only does diversifying the cyber security industry help it better reflect the population, it can bring different ways of thinking and different skills to the table, and it could also help cyber security teams gain a better idea of how the malicious hacking operations they're trying to defend networks again work.

Improving diversity in cyber security teams should, therefore, be a key aim for organisations across the industry, because it can help protect people and businesses from a wider range of cyber threats.

It's also important to recognise that people can take different routes into cyber security, some might get qualifications from university or information security certifications, others might learn skills via online courses, some might even teach themselves entirely.

The Report says, “Gay and lesbian respondents reported feeling discriminated against over their sexual orientation at eight times the level of survey respondents as a whole. Female respondents reported nearly two and half times the level negative incidents as a result of their gender identity than the survey as a whole. “Given these findings, it is worrying to discover that the industry has low levels of incident reporting and resolution.... In the circumstances, it is little surprise that just over 9% of all those surveyed are considering changing employers or leaving the industry entirely.” 

NCSC:          iNews:        ZDNet:     FuentITech:     Digital Guardian:     Image: Unsplash

You Might Also Read: 

Psycho-Cyberchology:

 

 

« Russia Wants A Deal With The US On Cyber Security
Ukraine Cyber Police Crack Hacker Group »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

GlassSquid

GlassSquid

glasssquid.io simplifies your cyber security job search. We want to help you find your next perfect fit opportunity by removing the confusion.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.