Women In Cyber Take The Spotlight

As the cybersecurity industry continues to struggle to meet a workforce gap, an estimated 3.5 million jobs are expected to remain unfilled by 2021, it’s clear that encouraging women and those from diverse backgrounds to pursue careers in the field will be a key factor in staying ahead of the threat landscape. 

Changes at the RSA conference, scheduled for February in San Francisco, along with a handful of large companies stepping up to the plate with training and recruitment efforts, show that the industry may finally be getting serious about addressing the issue.

While diversity in general is an issue in tech, women are particularly underrepresented. They hold about 26 percent of tech jobs according to a research report by The American Association of University Women (AAUW), and in cybersecurity specifically that drops to just 11 percent of roles globally being held by women according to the (ISC)2 2017 Global Information Security Workforce: Women in Cyber Security study.

Aiming to create role models for others considering a career in info-security, some of the women that do work in cyber were recently thrust into the spotlight with Forbes’ US list of the 50 Top Women in Technology.

The honorees come from a wide range of sectors, including enterprise and consumer technology, gaming, artificial intelligence, aerospace and biotech, among others. 

Among them are four cybersecurity leaders: Celeste Fralick, chief data scientist at McAfee; Laura Mather, cofounder at Silver Tail Systems; Katie Moussouris, CEO and founder at Luta Security; and Tal Rabin, head of the Cryptography Research Group for the Thomas J. Watson Research Center at IBM.

Also, RSA, after facing enormous criticism for women representing less than 1 percent of the speaker lineup at its last outing (and just one keynote), in November announced that it is shying away from all-male panels and would be encouraging companies to diversify their representatives to the conference, among other changes.

Against this backdrop of an increased focus on women already working in the field, a range of organizations are rolling out efforts to attract new women and girls to the mix.

For instance, IBM and Florida International University recently did their part by inviting more than 200 girls from seven different schools across Miami-Dade for “IBMCyberDay4Girls,” a one-day conference that educates young women in fifth grade up to eleventh grade about cybersecurity, from how to protect yourself on social media to what careers are available in cybersecurity.

“We have a huge shortage of cybersecurity professionals, and this is a very good way for them to start getting interested. They see how different aspects of cybersecurity affect their personal lives and their families,” said Helvetiella Longoria, CISO at FIU. “We hope to continue to encourage and support female students to pursue interests in cybersecurity. Through these programs and our continued partnership with IBM, we hope to provide a voice in guiding and fostering them in this direction.”

The Cisco Women in Cybersecurity mentoring program meanwhile reaches out to girls in middle school, high school and college and runs recruitment programs for jobs at the networking giant. The program also connects students externally with other organisations.

And Apple said in late November that it would launch a new program designed to address the scarcity of women in tech executive and computer programming jobs. 

Beginning in January, female entrepreneurs and programmers will attend two-week tutorial sessions at the company’s Cupertino headquarters; these will run every three months.

These and other industry efforts are important in dispelling the stereotypes that exist around cyber and tech jobs, a key factor in the lack of diversity.

“One myth [about cybersecurity] is that to work in it, you have to be hacker or a coder and that it’s just for boys. 

The other is that everybody thinks that you have to have a computer science degree, and that’s just not true. We need people with all sorts of skills,” said IBM’s academic outreach leader, Heather Ricciuto.

Threatpost:

You Might Also Read:

Why Are So Few Women In Cybersecurity?

« The NSA Is Spying On You Now
Audit Finds Cyber Vulnerabilities In US Missile Defense System »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

PayPal Ventures

PayPal Ventures

PayPal Ventures invests in companies at the forefront of innovation in fintech, payments, commerce enablement, artificial intelligence, blockchain and cryptocurrency, regulatory and cyber technology.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.