GCHQ Wants Teenage Girls To Join The Cybersecurity Fight

GCHQ is launching a competition with the aim of encouraging more girls to think about a career in cyber security. Girls aged 13 to 15 will compete in tests that will also cover logic and coding, networking and cryptography.

Women currently only make up 10% of the global cyber workforce, the agency says.

The competition is part of a five-year National Cyber Security Strategy announced in November 2016, and will be overseen by the new National Cyber Security Centre (NCSC).

Working in teams of four, the girls will complete online tasks remotely on their school computers, with each stage being harder than the previous one. The 10 groups with the highest scores will then be invited to the CyberFirst competition final in London to investigate a complex cyber threat.

CyberFirst's winning team will be awarded £1,000 worth of computer equipment for their school, as well as individual prizes.

First Steps

The NCSC was set up to be the main body for cyber security at a national level. It manages national cyber security incidents, carries out real-time threat analysis and provides advice.

An NCSC spokeswoman said: "Women can, and do, make a huge difference in cyber security, this competition could inspire many more to take their first steps into this dynamic and rewarding career."

Government Communications Headquarters director Robert Hannigan said: "I work alongside some truly brilliant women who help protect the UK from all manner of online threats.

"The CyberFirst Girls competition allows teams of young women a glimpse of this exciting world and provides a great opportunity to use new skills."

BBC:            Difficult: Attracting Women To Cybersecurity:

Women Write Better Computer Code Than Men:

 

« Twelve Things To Know About Self Driving Cars
How Much Cyber Insurance Is Enough? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.