Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Cybersecurity » Social Engineering » Women Needed in Cybersecurity

Women Needed in Cybersecurity

by SEORG on February 8, 2019

2018 was an extremely intense year in the field of cybersecurity. The Verizon Data Breach Report confirmed 2,216 breaches across 65 countries. From what the experts say, we can expect 2019 to be intense as well.  According to a report by Cybersecurity Ventures, it’s predicted that by 2021 cybercrime will cost the world $6 trillion annually. The report also predicts that by 2021 there will be 3.5 million unfilled cybersecurity positions. Why is there such a massive shortfall of cybersecurity professionals? In part, the answer lies in the gender gap that plagues the cybersecurity profession. Simply put, women are needed in cybersecurity.  

Women Needed in Cybersecurity

In 2013, women made up only 11 percent of the global cybersecurity workforce. Jump forward 5 years to 2018 and a report form Cybersecurity Ventures states that women represent just 20 percent of the global workforce in cybersecurity. The gender gap is not closing quickly enough to meet the shortfall crisis of cybersecurity professionals. What can be done to encourage women to join the ranks of cybersecurity professionals? Two keys to open the cybersecurity door for women are education and environment.  

Education

The perception held by both men and women is that cybersecurity is a masculine career. Therefore, education is vital to change this perception. Education that starts early will have the most powerful impact. Parents and guardians, teach your children that both girls and boys can excel in the fields of science, technology, engineering, and science. If you are the parent or guardian of a girl encourage her to pursue STEM curriculum. Show her that there are programs and scholarships designed to engage and promote women in cybersecurity. Helpful ideas for parents and guardians, can be found in this newsletter, Teach Early, Teach Often: Cybersecurity Education for Children. A few programs and organizations that get young girls and women involved in cybersecurity are: 

  • AWSN – Australian Women in Security Networks  
  • WSC – The Women’s Society of Cyberjutsu 
  • SECTF4Kids 
  • SECTF4Teens 
  • Social-Engineer Capture The Flag (The SECTF) 
  • Masters Level Social Engineering 
  • Cyber First Girls 
  • Good girls write code 
  • Girls who code 
  • Raytheon’s Women Cyber Security Scholarship Program 
  • SWSIS Scholarships for Women Studying Information Security 
  • WISP

Environment

Entering a male-dominated field can be intimidating for women.  Government Technology reports on some of the issues facing women. They include: insensitivity in the workplace, the glass ceiling, and a pop culture where the images of tech workers are mostly male.   

To attract and keep women in the cybersecurity field, these issues must be addressed. If you are an enterprise looking to fill cybersecurity positions, search for women to hire and promote; doing so will help shatter the glass ceiling. Additionally, broaden the imagery of cybersecurity professionals to include women. The standard picture doesn’t always have to be a guy in a hoodie, or a man in a mask, does it? Don’t simply ignore the issue of insensitivity in cybersecurity culture and the workplace. Take ownership of it and look to effect change by implementing workplace training that promotes respect. Doing so will put your enterprise in a leading position to meet the shortfall of unfilled cybersecurity positions. You will benefit by having a more diverse and innovative workforce. Commenting on the value of women in the cybersecurity field, The University of San Diego quoted this insightful comment from the NCIS, “Diversity encourages a culture where divergent opinions can be brought together to develop innovative solutions to solve some of the toughest problems our nation faces today.”  

Women in cybersecurity!

Are you a woman contemplating a career in cybersecurity? If so, a go-to list of female cybersecurity professionals will motivate you. Their efforts to change the face of cybersecurity are inspirational. Here are three must have resources: 

  • 10 Women in Cybersecurity You May Not Know But Should.  
  • From SECTF to pro SE with Rachel and Whitney 
  • Cybersecurity Consultant

We’re proud to say that our own @CatMurd0ck is mentioned by DarkReading’s 10 Women in Cybersecurity You May Not Know but Should.  Cat received the highest OSINT score ever at the SECTF competition hosted by Social-Engineer.org. A few months later, Chris Hadngay, CEO of Social-Engineer, LLC hired her as a pentester and podcast panelist.   

Women are needed in the cybersecurity field. The need to bridge the gender gap in cybersecurity is recognized by both corporations and government organizations. Leaders, if you are searching for great talent, don’t forget that women are an under-tapped resource!    

Sources: 

https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdf
https://cybersecurityventures.com/jobs/
https://www.techrepublic.com/blog/it-security/gender-gap-why-information-security-needs-more-women/
https://cybersecurityventures.com/women-in-cybersecurity/
https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-08-issue-109/
https://www.auswomeninsecurity.net/  
https://womenscyberjutsu.org/default.aspx
https://www.social-engineer.org/general-blog/sectf4kids/
https://www.social-engineer.org/event-updates/defcon-updates/sectf4kids-sectf4teens-def-con-25/
https://www.social-engineer.org/sevillage-def-con/ 
https://www.cyberfirst.ncsc.gov.uk/girlscompetition/
http://goodgirlswritecode.org/
https://girlswhocode.com/
https://www.scholarships.com/financial-aid/college-scholarships/scholarships-by-major/cybersecurity-scholarships/raytheons-women-cyber-security-scholarship-program/
https://www.scholarships.com/financial-aid/college-scholarships/scholarships-by-major/cybersecurity-scholarships/swsis-scholarships-for-women-studying-information-security/
http://www.govtech.com/workforce/Why-Are-So-Few-Women-in-Cybersecurity.html
https://onlinedegrees.sandiego.edu/women-cyber-security-reasons-to-enter-field/
http://www.zoetraining.com/articles/20100125-top-10-for-2010-the-most-requested-training-topics
https://www.darkreading.com/careers-and-people/10-women-in-security-you-may-not-know-but-should/d/d-id/1331410?image_number=6
https://www.social-engineer.org/podcast/ep-110-from-sectf-to-pro-se-with-whitney-and-rachel/
https://www.bls.gov/careeroutlook/2018/interview/cybersecurity-consultant.htm?view_full
https://www.social-engineer.com/about/ 
https://www.social-engineer.org/framework/general-discussion/categories-social-engineers/penetration-testers/
https://www.wisporg.com/ 

Image:
https://www.google.com/search?q=women+in+cybersecurity&client=firefox-b-1&source=lnms&tbm=isch&sa=X&ved=0ahUKEwii0o2BxIfgAhUMVN8KHdhIB40Q_AUIDygC&biw=1152&bih=555#imgrc=8rzHz8weg9J7vM: 

The post Women Needed in Cybersecurity appeared first on Security Through Education.


Recent Articles By Author
  • DEF CON® Kids: Preparing Them for the Future
  • The Danny Ocean of Social Engineer’s
  • Securing Devices at Home and Work
More from SEORG

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by SEORG. Read the original post at: https://www.social-engineer.org/general-blog/women-needed-in-cybersecurity/

February 8, 2019February 8, 2019 SEORG Cat Murdock, Chris Hadnagy, cybersecurity professionals, education, environment, General Social Engineer Blog, pentester, Rachel Tobac, sectf, social engineer, Whitney Maxwell, women in cybersecurity, Women Needed in Cybersecurity
  • ← BSides Tampa 2019, Marc Baker’s Security Analytics in the Cloud
  • Growing the Number of Women in Cybersecurity — CyberSpeak Podcast →

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
U.S. Election Security (and Insecurities)
Drupal Core: Behind the Vulnerability
The Future Of Work: The Hybrid Workforce
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 2 days ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 3 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 4 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Security Humor

via  the comic delivery system monikered  Randall Munroe  resident at   XKCD  !

XKCD ‘Contiguous 41 States’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.