Only 3% Of Cyber Security Startups Are Led By Women

The skills gap in cybersecurity has been discussed at length. But what about diversity in cybersecurity? While that has also received attention, cybersecurity firm NopSec published their recent Women Leaders in Cybersecurity report to put some numbers behind female leaders in the industry. 

In 2020, cybersecurity startups raised $8.9 billion and last year, that number increased to more than $21 billion

While this data is exciting and promising for the cybersecurity industry as a whole, there’s one big question that isn’t being asked: how much of that funding went to companies led by women? 

“As a female CEO of a cybersecurity company myself, I was curious to know the answer to this question,” said Lisa Xu, CEO of NopSec. “Over the past two months, we collected and analyzed cybersecurity startups with one goal: to find out how many are led by female CEOs?” 

The report found that of the 654 startups that raised more than $1,000,000 in funding in 2020 and 2021, only 22 - or 3.3% - were led by female CEOs.

“With just 3% of companies being led by women, do we really wonder why we have a gender diversity problem in cybersecurity? What’s actually being done to address this problem? Is there any real progress being made to fix it?” said Xu. 

She goes on to say, “We are doing this because before we can expect to see progress made to solve this problem, we all need to know where we stand. What gets measured gets improved. We’ll take on the responsibility of monitoring funding going to women-led cybersecurity companies but it will be up to investors to determine what gets improved. Investors backing more female CEOs who are running cybersecurity companies will bring more women into cybersecurity — it’s truly that simple.” 

If there are more women in cybersecurity — everyone wins. Organizations get to build more diverse teams, investors get to invest in companies that have been proven to outperform their male counterparts, and most importantly, all the incredibly talented women out there get the opportunity to unleash their value to the world. It’s up to investors to make this happen. 

Contributed By: NOPSEC

You Might Also Read:

New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure:

 

« Is Europe Ready For Cyber Warfare?
A History Of Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.