{"id":37485,"date":"2020-11-24T07:27:48","date_gmt":"2020-11-24T12:27:48","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=37485"},"modified":"2022-08-04T06:58:25","modified_gmt":"2022-08-04T10:58:25","slug":"cybersecurity-diversity-gap-header","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-diversity-gap-header\/37485\/","title":{"rendered":"With cybersecurity skills in short supply, why are women struggling in this career?"},"content":{"rendered":"<p>Cybersecurity needs people badly. In the US, there <a href=\"https:\/\/www.securitymagazine.com\/articles\/92835-new-research-shows-us-cybersecurity-talent-shortage\" target=\"_blank\" rel=\"noopener nofollow\">is twice as many cybersecurity jobs as there are people qualified to fill them<\/a>.\u00a0 The number and severity of cyberattacks continue to grow, so does the skills shortage: <a href=\"https:\/\/cybersecurityventures.com\/jobs\/#:~:text=Over%20the%20eight%2Dyear%20period,to%20the%20MIT%20Technology%20Review.\" target=\"_blank\" rel=\"noopener nofollow\">employers won\u2019t fill an estimated 3.5 million cybersecurity positions worldwide in 2021<\/a>.<\/p>\n<p>But with a closer look, the talent gap is unsurprising. Cyber, even more than tech more broadly, is largely a man\u2019s world.<\/p>\n<p>\u201cWhen you leave women out of the process and conversation, you\u2019re leaving a host of incredible security solutions on the table,\u201d says Fareedah Shaheed, founder and CEO of the security and safety trainers <a href=\"https:\/\/sekuva.mykajabi.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Sekuva.<\/a><\/p>\n<p>\u201cDiversity of thought is so important,\u201d says Mollie Chard, cybersecurity manager at tech consultants, <a href=\"https:\/\/www.capgemini.com\/gb-en\/\" target=\"_blank\" rel=\"noopener nofollow\">Capgemini UK<\/a>. \u201cWhen you\u2019re problem-solving, if you\u2019ve got people from minority groups present, or people from another gender, you can attack a situation from angles you might not have thought of.\u201d<\/p>\n<p>I interviewed five women from different backgrounds with successful careers in cybersecurity. I asked for their insights into why women are still the exception rather than the rule in this lucrative and interesting field.<\/p>\n<blockquote><p>They all agreed things are starting to shift for women in cybersecurity. But the urgent need and shortage of people demand even more pace. Cyber needs an influx of workers as never before, and we need it now.<\/p>\n<\/blockquote>\n<p>Women can help release the sector from the talent trap, but the industry must change. It must make meaningful, even revolutionary changes in its attitudes, culture and practices.<\/p>\n<h2>Women excel in the skills cybersecurity says it needs<\/h2>\n<p>In 2017, women made up only <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/women-in-cybersecurity.html\" target=\"_blank\" rel=\"noopener nofollow\">14 percent of the US cyber workforce<\/a>. Globally, the numbers are even more dismal: <a href=\"https:\/\/www.nature.com\/articles\/d41586-018-03327-w\" target=\"_blank\" rel=\"noopener nofollow\">In Asia-Pacific, Latin America and Europe, it\u2019s 10 percent or less<\/a>.<\/p>\n<p>Travel up the power ladder, and the disparities only grow. Only <a href=\"https:\/\/digitalguardian.com\/blog\/anatomy-ciso-breakdown-todays-top-security-leaders-infographic\" target=\"_blank\" rel=\"noopener nofollow\">11 percent of security managers at the US Fortune 100 companies are women<\/a>, and just <a href=\"https:\/\/www.fifthdomain.com\/workforce\/2019\/01\/18\/how-more-women-on-cybersecurity-teams-can-create-advantages\/\" target=\"_blank\" rel=\"noopener nofollow\">one percent of women in cybersecurity are in top leadership positions<\/a>.<\/p>\n<p>Business leaders keep saying they appreciate so-called \u201csoft skills,\u201d and cybersecurity is no different. According to PwC 2020 survey, <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/global-digital-trust-insights.html\" target=\"_blank\" rel=\"noopener nofollow\">top business and social skills that \u00a0managers want for new cybersecurity hires are analytical skills (47 percent), communication (43 percent) and critical thinking (42 percent.)<\/a> Technical skills are easier to learn than soft skills, and even though <a href=\"https:\/\/www.the74million.org\/article\/why-women-excel-at-prized-soft-skills-but-still-trail-men-when-it-comes-to-being-hired-for-the-stem-careers-of-the-future\/\" target=\"_blank\" rel=\"noopener nofollow\">studies show women are generally better at using soft skills,<\/a> the shortage of people with them didn\u2019t help women in cybersecurity.<\/p>\n<p>Even seven years ago, a study co-sponsored by Symantec showed that women have more \u201cdesired skills\u201d than men.\u00a0 The survey\u00a0 places a great emphasis on training employees in cybersecurity awareness.<\/p>\n<h2><span lang=\"EN-US\">Why cybersecurity needs diverse perspectives<\/span><\/h2>\n<blockquote><p>It\u2019s always beneficial to have people on cybersecurity teams with different backgrounds because threat actors also have various backgrounds and experiences.<\/p>\n<cite><p>Dr. Fauzia Idrees Abro, CEO at Cynosure Technologies <\/p><\/cite><\/blockquote>\n<p>While leaders consider soft skills as the most-wanted attributes in cyber hires, some girls still shy away from tech-related fields, having become persuaded that boys are better at science and math. \u201cThis perception is reinforced when women who pursue tech careers turn out to be the only one in the room,\u201d Abro says. \u201cIn almost every engineering team I\u2019ve been a part of, there has been only one or two women.\u201d<\/p>\n<p>Many groups and educators are working to change the perception that science, technology, engineering and math (STEM) are for boys. Cybersecurity packs an added punch: The term, like the field, hails from the military. The <a href=\"https:\/\/www.fedscoop.com\/does-cybersecurity-need-a-new-language\/\" target=\"_blank\" rel=\"noopener nofollow\">sector is rife with borrowed military jargon and aggressive, adversarial language \u2013 potentially off-putting to many women<\/a>, Abro points out.<\/p>\n<p>However, women in the industry claim they are \u00a0often misunderstood. \u201cPeople don\u2019t know what we do,\u201d Mollie Chard says.<\/p>\n<p>\u201cMost people don\u2019t even know this field exists,\u201d says Shaheed, who learned about cybersecurity careers from her father. \u201cWe don\u2019t explain cybersecurity in a way that lets people understand there\u2019s more to it than programming or even hacking.\u201d<\/p>\n<p>Assumptions about what\u2019s needed to get a job in the field can be intimidating, says Noureen Njoroge, cybersecurity threat intelligence engineer at Cisco Systems and president of North Carolina Women in Cybersecurity. Common misunderstandings she\u2019s heard include \u00a0that one has to have many certifications to enter the field, has to know how to code and has to have many years of experience to get a foot in the door.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Secure Futures<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>What's coming next?<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Be first to find out what\u2019s happening in tech, leadership and cybersecurity.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"#modal_newsletter\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener\">Stay ahead<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<p>Chard has a Bachelor of Arts in English language and a Master\u2019s in philosophy. She doesn\u2019t know how to code. \u201cYou need a passion for technology and to understand the technology a bit,\u201d she says. But for many cyber jobs, \u201cyou don\u2019t need to be a developer. You don\u2019t need to be a coder.\u201d Education is the best way to change these misperceptions, but cybersecurity often isn\u2019t mentioned as a career choice in schools, Shaheed points out.<\/p>\n<h2>Discrimination is a real problem<\/h2>\n<p>While changing perceptions of the field may help close the gender gap, changing perceptions <em>in <\/em>the field could do more. Women face barriers \u201cfrom recruitment to career development and performance management, culminating in their leaving the industry,\u201d Abro says.<\/p>\n<p>Those I interviewed cite a long list of obstacles, including inflexible long-hours culture, lack of role models and the traditional \u201cglass ceiling\u201d \u2013 finding they cannot progress into more senior roles in their organization.<\/p>\n<p>Abro tells the story of a female friend who arrived at an interview for a government cybersecurity job to find half the all-male panel had left. Her interview was a mere formality. The man who got the job was less qualified than her.<\/p>\n<p>Women who do get hired often find their problems are just starting. \u201cMany leave the industry due to burnout, lack of career progression and toxic work culture,\u201d says Lisa Ventura, CEO and founder of the <a href=\"https:\/\/cybersecurityassociation.co.uk\/\" target=\"_blank\" rel=\"noopener nofollow\">UK Cyber Security Association<\/a> and author of <a href=\"https:\/\/www.amazon.com\/Rise-Cyber-Women-Inspirational-security\/dp\/B089M619Z7\" target=\"_blank\" rel=\"noopener nofollow\">Rise of the Cyber Women<\/a><em>. <\/em>\u201cWomen are still paid less and promoted less, and deal with discrimination and harassment, which leads them to pursue other career paths away from cybersecurity,\u201d she says. In a 2019 study, international cybersecurity professional membership association (ISC)<sup>2<\/sup> found that <a href=\"https:\/\/www.isc2.org\/Research\/2019-Cybersecurity-Workforce-Study\" target=\"_blank\" rel=\"noopener nofollow\">globally, women in cybersecurity earn 21 percent less than male counterparts<\/a>.<\/p>\n<p>Getting ahead can be tougher for women too, because of the lack of women in the upper echelons of cybersecurity firms. <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/margaret-dawson-interview\/34231\/\" target=\"_blank\" rel=\"noopener nofollow\">For career advancement, having a mentor is key<\/a>. Many women don\u2019t even realize that they need one. For those who do, finding one can be hard.<\/p>\n<h2>Women can be part of making change<\/h2>\n<p>Every woman I interviewed was optimistic that more women will enter cybersecurity in future. The aforementioned (ISC) study found more millennial women entering the field and more women rising to top management positions.<\/p>\n<p>One reason may be more networking and educational organizations aimed at helping women. Each of my interviewees is a volunteer with a women-in-cyber organization. They all see education and mentoring as vital for improving equality in the profession.<\/p>\n<p>\u201cTo create change, one of the best roles we can play as women is to mentor other women and be publicly visible, so we\u2019re not hiding in the shadows,\u201d Shaheed says.<\/p>\n<p>Abro says, \u201cTo bring equality to the cybersecurity profession, women should not be intimidated, shouldn\u2019t shy away from assuming responsibility and should take advantage of their opportunities.<\/p>\n<p>\u201cWomen should network and look out for mentors who can encourage them to pursue and progress in their careers. Women should have confidence in their capabilities and get out of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Impostor_syndrome\" target=\"_blank\" rel=\"noopener nofollow\">imposter syndrome<\/a>. They should embrace learning and gaining skills without fear of failures.\u201d<\/p>\n<p>\u201cDo your research,\u201d Chard advises. \u201cTalk to people, even within your company, and find out what they do. Decide what your goals are and go for it.\u201d Chard recognizes the imposter syndrome Abro mentions too, and knows how to overcome it: \u201cWhen you don\u2019t feel confident, fake it until you make it.\u201d<\/p>\n<p>With rising numbers of women in cybersecurity and greater awareness of the value of diversity in organizations, the future looks bright. Nevertheless, cybersecurity has a dire skills shortage today. The number of women coming into the career is still not enough, and they\u2019re not being promoted fast enough. While the industry as a whole should address the many barriers women report, such as discrimination, long-hours culture and harassment, women can also take action to give themselves the best chance to get a foot in the door and get the promotions they deserve. Invest in your skills and knowledge with education, get yourself a mentor and realize you\u2019re no imposter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attitudes toward women in cybersecurity are slowly changing, but there are things women can do today to grease the wheels of their careers.<\/p>\n","protected":false},"author":2557,"featured_media":37659,"template":"","coauthors":[3654],"class_list":{"0":"post-37485","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-leadership","7":"emagazine-category-opinions","8":"emagazine-category-women-and-diversity","9":"emagazine-tag-careers","10":"emagazine-tag-skills","11":"emagazine-tag-women"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-diversity-gap-header\/37485\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/37485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/37659"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=37485"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=37485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}