GCHQ Introduces Women Only Cybersecurity Training

All-female classes in cyber-skills are being set up by the GCHQ intelligence service, in an attempt to recruit a wider range of online security experts. Almost 90% of the cyber-skills workforce worldwide is male, says GCHQ's cyber-defence arm, the National Cyber Security Centre (NCSC).

With warnings of serious skills shortages, the security services are worried about missing female recruits.


Chris Ensor of the NCSC says it needs to "address the imbalance". There will be 600 free places on all-female CyberFirst Defenders courses in April and May this year, run as a mix of residential and non-residential training events. The venues for the four-day courses will include Nottingham, Lancaster, Wrexham, Edinburgh and Oxfordshire.

Cyber-Girls
The intention is to make cyber-skills lessons more open to teenage girls, in a field which has been accused of having a very male image, whether it is James Bond-style stereotypes or stock photos of teenage boys in hoodies.
All-female classes have been used in some schools as a way of building confidence in subjects once seen as being more male-dominated.

Aisling Brown, curriculum leader at the Stephen Perse Foundation school in Cambridge, said that teaching boys and girls separately in computing can help them with different ways of learning. In computing classes, she said: "Girls are sometimes more reflective and take time to volunteer answers, while boys can tend to rush." 

It follows the CyberFirst Girls competition, launched last month, and run by the NCSC to promote computer skills and careers in cyber-security. The agency wants more teenage girls to get involved, with questions designed to build skills in cryptography, cyber-security, logic and coding and networking.

It is part of a wider CyberFirst project aimed at raising cyber-skills in young people up to the age of 18. The security services, needing talented staff to tackle the growing threat of cyber-attacks, have been concerned about recruiting from too small a pool of people with computer skills.

The lack of women in cybersecurity is part of the bigger picture of women in science, technology, engineering and maths, says the NCSC.

The agency says about 35% of its overall staff are female and half of its senior leadership. As well as wanting a better gender balance, the NCSC wants to attract applicants from a wider range of social backgrounds, from state as well as independent schools.

'Inquisitive instincts'
Among the schools taking part in the competition is the Tauheedul Islam Girls' High School, a Muslim state school in Blackburn which is among the highest-performing secondary schools in the country.

"Women are very under-represented in the global cyber-industry," said assistant principal, Asia Ali, who says she wants "exceptionally talented girls" to help make the country safer online.

The NCSC has warned of the scale of wide-ranging cyber-threats.
Already this month, the NCSC has highlighted threats to hack smart TV devices, cyber-attacks on information about German politicians and the theft of insurance and legal documents relating to the 9/11 attacks. Mr Ensor, the agency's deputy director for skills and growth, said increasing numbers have been taking part in their training courses.

"However, women only make up a small proportion of the global cyber-workforce, and throughout GCHQ and the NCSC we are looking to address the imbalance." He said he wanted to appeal to the "inquisitive instincts of young people".

BBC

You Might Also Read:

Are Women Better At Cyber Security?:

 

 

« What Financial Services Executives Need to Know About Data-Security
The Age Of Surveillance Capitalism Dawns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.