Women In Cyber Take The Spotlight

As the cybersecurity industry continues to struggle to meet a workforce gap, an estimated 3.5 million jobs are expected to remain unfilled by 2021, it’s clear that encouraging women and those from diverse backgrounds to pursue careers in the field will be a key factor in staying ahead of the threat landscape. 

Changes at the RSA conference, scheduled for February in San Francisco, along with a handful of large companies stepping up to the plate with training and recruitment efforts, show that the industry may finally be getting serious about addressing the issue.

While diversity in general is an issue in tech, women are particularly underrepresented. They hold about 26 percent of tech jobs according to a research report by The American Association of University Women (AAUW), and in cybersecurity specifically that drops to just 11 percent of roles globally being held by women according to the (ISC)2 2017 Global Information Security Workforce: Women in Cyber Security study.

Aiming to create role models for others considering a career in info-security, some of the women that do work in cyber were recently thrust into the spotlight with Forbes’ US list of the 50 Top Women in Technology.

The honorees come from a wide range of sectors, including enterprise and consumer technology, gaming, artificial intelligence, aerospace and biotech, among others. 

Among them are four cybersecurity leaders: Celeste Fralick, chief data scientist at McAfee; Laura Mather, cofounder at Silver Tail Systems; Katie Moussouris, CEO and founder at Luta Security; and Tal Rabin, head of the Cryptography Research Group for the Thomas J. Watson Research Center at IBM.

Also, RSA, after facing enormous criticism for women representing less than 1 percent of the speaker lineup at its last outing (and just one keynote), in November announced that it is shying away from all-male panels and would be encouraging companies to diversify their representatives to the conference, among other changes.

Against this backdrop of an increased focus on women already working in the field, a range of organizations are rolling out efforts to attract new women and girls to the mix.

For instance, IBM and Florida International University recently did their part by inviting more than 200 girls from seven different schools across Miami-Dade for “IBMCyberDay4Girls,” a one-day conference that educates young women in fifth grade up to eleventh grade about cybersecurity, from how to protect yourself on social media to what careers are available in cybersecurity.

“We have a huge shortage of cybersecurity professionals, and this is a very good way for them to start getting interested. They see how different aspects of cybersecurity affect their personal lives and their families,” said Helvetiella Longoria, CISO at FIU. “We hope to continue to encourage and support female students to pursue interests in cybersecurity. Through these programs and our continued partnership with IBM, we hope to provide a voice in guiding and fostering them in this direction.”

The Cisco Women in Cybersecurity mentoring program meanwhile reaches out to girls in middle school, high school and college and runs recruitment programs for jobs at the networking giant. The program also connects students externally with other organisations.

And Apple said in late November that it would launch a new program designed to address the scarcity of women in tech executive and computer programming jobs. 

Beginning in January, female entrepreneurs and programmers will attend two-week tutorial sessions at the company’s Cupertino headquarters; these will run every three months.

These and other industry efforts are important in dispelling the stereotypes that exist around cyber and tech jobs, a key factor in the lack of diversity.

“One myth [about cybersecurity] is that to work in it, you have to be hacker or a coder and that it’s just for boys. 

The other is that everybody thinks that you have to have a computer science degree, and that’s just not true. We need people with all sorts of skills,” said IBM’s academic outreach leader, Heather Ricciuto.

Threatpost:

You Might Also Read:

Why Are So Few Women In Cybersecurity?

« The NSA Is Spying On You Now
Audit Finds Cyber Vulnerabilities In US Missile Defense System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.