Women In Cyber Take The Spotlight

As the cybersecurity industry continues to struggle to meet a workforce gap, an estimated 3.5 million jobs are expected to remain unfilled by 2021, it’s clear that encouraging women and those from diverse backgrounds to pursue careers in the field will be a key factor in staying ahead of the threat landscape. 

Changes at the RSA conference, scheduled for February in San Francisco, along with a handful of large companies stepping up to the plate with training and recruitment efforts, show that the industry may finally be getting serious about addressing the issue.

While diversity in general is an issue in tech, women are particularly underrepresented. They hold about 26 percent of tech jobs according to a research report by The American Association of University Women (AAUW), and in cybersecurity specifically that drops to just 11 percent of roles globally being held by women according to the (ISC)2 2017 Global Information Security Workforce: Women in Cyber Security study.

Aiming to create role models for others considering a career in info-security, some of the women that do work in cyber were recently thrust into the spotlight with Forbes’ US list of the 50 Top Women in Technology.

The honorees come from a wide range of sectors, including enterprise and consumer technology, gaming, artificial intelligence, aerospace and biotech, among others. 

Among them are four cybersecurity leaders: Celeste Fralick, chief data scientist at McAfee; Laura Mather, cofounder at Silver Tail Systems; Katie Moussouris, CEO and founder at Luta Security; and Tal Rabin, head of the Cryptography Research Group for the Thomas J. Watson Research Center at IBM.

Also, RSA, after facing enormous criticism for women representing less than 1 percent of the speaker lineup at its last outing (and just one keynote), in November announced that it is shying away from all-male panels and would be encouraging companies to diversify their representatives to the conference, among other changes.

Against this backdrop of an increased focus on women already working in the field, a range of organizations are rolling out efforts to attract new women and girls to the mix.

For instance, IBM and Florida International University recently did their part by inviting more than 200 girls from seven different schools across Miami-Dade for “IBMCyberDay4Girls,” a one-day conference that educates young women in fifth grade up to eleventh grade about cybersecurity, from how to protect yourself on social media to what careers are available in cybersecurity.

“We have a huge shortage of cybersecurity professionals, and this is a very good way for them to start getting interested. They see how different aspects of cybersecurity affect their personal lives and their families,” said Helvetiella Longoria, CISO at FIU. “We hope to continue to encourage and support female students to pursue interests in cybersecurity. Through these programs and our continued partnership with IBM, we hope to provide a voice in guiding and fostering them in this direction.”

The Cisco Women in Cybersecurity mentoring program meanwhile reaches out to girls in middle school, high school and college and runs recruitment programs for jobs at the networking giant. The program also connects students externally with other organisations.

And Apple said in late November that it would launch a new program designed to address the scarcity of women in tech executive and computer programming jobs. 

Beginning in January, female entrepreneurs and programmers will attend two-week tutorial sessions at the company’s Cupertino headquarters; these will run every three months.

These and other industry efforts are important in dispelling the stereotypes that exist around cyber and tech jobs, a key factor in the lack of diversity.

“One myth [about cybersecurity] is that to work in it, you have to be hacker or a coder and that it’s just for boys. 

The other is that everybody thinks that you have to have a computer science degree, and that’s just not true. We need people with all sorts of skills,” said IBM’s academic outreach leader, Heather Ricciuto.

Threatpost:

You Might Also Read:

Why Are So Few Women In Cybersecurity?

« The NSA Is Spying On You Now
Audit Finds Cyber Vulnerabilities In US Missile Defense System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.