2018 was a significantly intense year in the field of cybersecurity! In fact, The Verizon Data Breach Report confirmed 2,216 breaches across 65 countries. Indeed, from what the experts say, we can expect 2019 to be intense as well.  According to a report by Cybersecurity Ventures, by 2021 cybercrime will cost the world $6 trillion annually. The report also predicts that by 2021 there will be 3.5 million unfilled cybersecurity positions. Why is there such a massive shortfall of cybersecurity professionals? In part, the answer lies in the gender gap that plagues the cybersecurity profession. In other words, women are needed in cybersecurity.

Women Needed in Cybersecurity

Women Needed in Cybersecurity

In 2013, women made up only 11 percent of the global cybersecurity workforce. Jump forward 5 years to 2018 and a report form Cybersecurity Ventures states that women represent just 20 percent of the global workforce in cybersecurity. Indeed, the gender gap is not closing quickly enough to meet the shortfall crisis of cybersecurity professionals. With this in mind, what can be done to encourage women to join the ranks of cybersecurity professionals? Two keys to open the cybersecurity door for women are education and environment.

Education

The perception is that cybersecurity is a masculine career. Therefore, education is vital to change this perception. Education that starts early will have the most powerful impact. Parents and guardians, teach your children that both girls and boys can excel in the fields of science, technology, engineering, and science. If you are the parent or guardian of a girl encourage her to pursue STEM curriculum. Show her that there are programs and scholarships designed to engage and promote women in cybersecurity.

Helpful ideas for parents and guardians, can be found in this newsletter, Teach Early, Teach Often: Cybersecurity Education for Children. A few programs and organizations that get young girls and women involved in cybersecurity are:

Environment

It’s important to realize that entering a male-dominated field is usually intimidating for women. In fact, Government Technology reports on some of the issues facing women. Such as, the glass ceiling, and a pop culture where the images of tech workers are mostly male.

To attract and keep women in the cybersecurity field, these issues must be addressed. If you are an enterprise looking to fill cybersecurity positions, search for women to hire and promote; doing so will help shatter the glass ceiling. Additionally, broaden the imagery of cybersecurity professionals to include women. The standard picture doesn’t always have to be a guy in a hoodie, or a man in a mask, does it? Don’t simply ignore the issue of insensitivity in cybersecurity culture and the workplace. Take ownership of it and look to effect change by implementing workplace training that promotes respect. Doing so will put your enterprise in a leading position to meet the shortfall of unfilled cybersecurity positions.

Another key point, you will benefit by having a more diverse and innovative workforce. In fact, commenting on the value of women in the cybersecurity field, The University of San Diego quoted this insightful comment from the NCIS, “Diversity encourages a culture where divergent opinions can be brought together to develop innovative solutions to solve some of the toughest problems our nation faces today.”

Women in Cybersecurity!

Are you a woman contemplating a career in cybersecurity? If so, a go-to list of female cybersecurity professionals will motivate you. Their efforts to change the face of cybersecurity are inspirational. Here are three must have resources:

The cybersecurity field needs women! Both corporations and government recognize the need to bridge the gender gap. Leaders, if you are searching for great talent, don’t forget that women are an under-tapped resource!

Sources:
https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdfhttps://cybersecurityventures.com/jobs/<https://www.techrepublic.com/blog/it-security/gender-gap-why-information-security-needs-more-women/https://cybersecurityventures.com/women-in-cybersecurity/https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-08-issue-109/https://www.auswomeninsecurity.net/  https://womenscyberjutsu.org/default.aspxhttps://www.social-engineer.org/general-blog/sectf4kids/https://www.social-engineer.org/event-updates/defcon-updates/sectf4kids-sectf4teens-def-con-25/
https://www.social-engineer.org/sevillage-def-con/
https://www.cyberfirst.ncsc.gov.uk/girlscompetition/http://goodgirlswritecode.org/https://girlswhocode.com/https://www.scholarships.com/financial-aid/college-scholarships/scholarships-by-major/cybersecurity-scholarships/raytheons-women-cyber-security-scholarship-program/https://www.scholarships.com/financial-aid/college-scholarships/scholarships-by-major/cybersecurity-scholarships/swsis-scholarships-for-women-studying-information-security/http://www.govtech.com/workforce/Why-Are-So-Few-Women-in-Cybersecurity.htmlhttps://onlinedegrees.sandiego.edu/women-cyber-security-reasons-to-enter-field/http://www.zoetraining.com/articles/20100125-top-10-for-2010-the-most-requested-training-topicshttps://www.darkreading.com/careers-and-people/10-women-in-security-you-may-not-know-but-should/d/d-id/1331410?image_number=6https://www.social-engineer.org/podcast/ep-110-from-sectf-to-pro-se-with-whitney-and-rachel/https://www.bls.gov/careeroutlook/2018/interview/cybersecurity-consultant.htm?view_fullhttps://www.social-engineer.com/about/
https://www.social-engineer.org/framework/general-discussion/categories-social-engineers/penetration-testers/https://www.wisporg.com/

Image: https://www.google.com/search?q=women+in+cybersecurity&client=firefox-b-1&source=lnms&tbm=isch&sa=X&ved=0ahUKEwii0o2BxIfgAhUMVN8KHdhIB40Q_AUIDygC&biw=1152&bih=555#imgrc=8rzHz8weg9J7vM:

Need an Event Speaker?

Get in touch today to schedule one of our staff to speak at your event

Get In Touch

Social Engineering Training

Visit our corporate site to get information on the world’s only practical, scientific, and certified social engineering courses.

Find Out More

Join the Newsletter


Join the Newsletter