Women In Cyber Take The Spotlight

As the cybersecurity industry continues to struggle to meet a workforce gap, an estimated 3.5 million jobs are expected to remain unfilled by 2021, it’s clear that encouraging women and those from diverse backgrounds to pursue careers in the field will be a key factor in staying ahead of the threat landscape. 

Changes at the RSA conference, scheduled for February in San Francisco, along with a handful of large companies stepping up to the plate with training and recruitment efforts, show that the industry may finally be getting serious about addressing the issue.

While diversity in general is an issue in tech, women are particularly underrepresented. They hold about 26 percent of tech jobs according to a research report by The American Association of University Women (AAUW), and in cybersecurity specifically that drops to just 11 percent of roles globally being held by women according to the (ISC)2 2017 Global Information Security Workforce: Women in Cyber Security study.

Aiming to create role models for others considering a career in info-security, some of the women that do work in cyber were recently thrust into the spotlight with Forbes’ US list of the 50 Top Women in Technology.

The honorees come from a wide range of sectors, including enterprise and consumer technology, gaming, artificial intelligence, aerospace and biotech, among others. 

Among them are four cybersecurity leaders: Celeste Fralick, chief data scientist at McAfee; Laura Mather, cofounder at Silver Tail Systems; Katie Moussouris, CEO and founder at Luta Security; and Tal Rabin, head of the Cryptography Research Group for the Thomas J. Watson Research Center at IBM.

Also, RSA, after facing enormous criticism for women representing less than 1 percent of the speaker lineup at its last outing (and just one keynote), in November announced that it is shying away from all-male panels and would be encouraging companies to diversify their representatives to the conference, among other changes.

Against this backdrop of an increased focus on women already working in the field, a range of organizations are rolling out efforts to attract new women and girls to the mix.

For instance, IBM and Florida International University recently did their part by inviting more than 200 girls from seven different schools across Miami-Dade for “IBMCyberDay4Girls,” a one-day conference that educates young women in fifth grade up to eleventh grade about cybersecurity, from how to protect yourself on social media to what careers are available in cybersecurity.

“We have a huge shortage of cybersecurity professionals, and this is a very good way for them to start getting interested. They see how different aspects of cybersecurity affect their personal lives and their families,” said Helvetiella Longoria, CISO at FIU. “We hope to continue to encourage and support female students to pursue interests in cybersecurity. Through these programs and our continued partnership with IBM, we hope to provide a voice in guiding and fostering them in this direction.”

The Cisco Women in Cybersecurity mentoring program meanwhile reaches out to girls in middle school, high school and college and runs recruitment programs for jobs at the networking giant. The program also connects students externally with other organisations.

And Apple said in late November that it would launch a new program designed to address the scarcity of women in tech executive and computer programming jobs. 

Beginning in January, female entrepreneurs and programmers will attend two-week tutorial sessions at the company’s Cupertino headquarters; these will run every three months.

These and other industry efforts are important in dispelling the stereotypes that exist around cyber and tech jobs, a key factor in the lack of diversity.

“One myth [about cybersecurity] is that to work in it, you have to be hacker or a coder and that it’s just for boys. 

The other is that everybody thinks that you have to have a computer science degree, and that’s just not true. We need people with all sorts of skills,” said IBM’s academic outreach leader, Heather Ricciuto.

Threatpost:

You Might Also Read:

Why Are So Few Women In Cybersecurity?

« The NSA Is Spying On You Now
Audit Finds Cyber Vulnerabilities In US Missile Defense System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.