Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

6/26/2019
10:00 AM
Neal O'Farrell
Neal O'Farrell
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Could Foster Kids Help Solve the Security Skills Shortage?

Foster Warriors is a new nonprofit initiative focused on helping foster kids find a place in the world, and especially in the world of security. Join us!

They are rare moments, moments when the security industry can do something that's not only in its own best interest but could also forge enormous social change. Change lives, even save lives. This may be one of those moments. 

As the industry desperately searches for more bodies to send to the barricades, necessity has forced it to be much more creative in where it looks. Veterans, retired law enforcement, gamers, high schoolers, the neurodiverse — they're all getting a close look to see if any among them would be interested in and suited for a career in cybersecurity.

But perhaps the biggest and most potent army-in-waiting is still getting little more than the stink eye. They're foster kids and there are lots of them — an estimated 435,000 just in the US. They're desperate for any opportunity to prove themselves worthy and are far more likely to go that extra mile for any employer willing to show such faith in them.

And if we're serious about encouraging more young women to consider careers in cybersecurity, foster care to the rescue. There are an estimated 50,000 young women, aged 12–18, in foster care at any given time. So let's give them an opportunity.

Helping foster kids find a place in the world, and especially in the world of security, could be life-changing. Even life-saving. According to the National Foster Youth Initiative:

  • Nearly 2,000 children age out of the US foster care system every 30 days, and one in every five will become instantly homeless.
  • 50% of foster kids who age out of the system still won't have any form of gainful employment by the age of 24.
  • There is less than a 3% chance for children who have aged out of foster care to earn a college degree at any point in their life.
  • Seven out of 10 girls who age out of the foster care system will become pregnant before the age of 21.

If the security industry is worried that foster kids are too broken to be trusted, they might be right. But just not right enough to completely ignore the thousands of foster youth who might be absolutely perfect for a career in cybersecurity and a place on your team, if only given the chance. Someone like Joyous "Joy" Huggins, whose LinkedIn profile suggests she's just about the perfect candidate for all kinds of security roles. After a stint in the Navy, Joy earned an undergraduate degree in cybersecurity followed by a Master’s in cybersecurity and now works as a threat analyst.

In her spare time, she runs an academy to help underprivileged boys and girls learn the basics of security and privacy. She's the product of one of the toughest foster upbringings imaginable. She was dumped into foster care at just three months old, a product of a family broken by alcoholism, drug addiction, and neglect. Nine homes later, at the age of 21, Joy was dumped back out of the foster system and left to fend for herself.

"People tend to prejudge foster kids because they simply misunderstand them," according to Huggins. "Sure, many have issues that need to be fixed. That doesn't mean they can't be fixed. And many have issues that are no different to any other young adult trying take those first steps on their own and in a new career."

Joy Huggins is the face of Foster Warriors, a new nonprofit initiative focused on engaging, recruiting, training, and supporting foster youth in preparation for entry-level careers in security. For high schoolers, it means not only teaching students the basics of cyber hygiene, but also teaching them how to be security evangelists and leaders in their own schools.

For older youth, the program includes local peer support and mentoring, extensive online security training (including cyber range training), preparation for entry-level certifications like CompTIA Security+, and hopefully that key first internship. Plus, all the time working with foster care experts to make sure participating students are not just ready emotionally but practically — with access to reliable transportation, personal support networks, a safe and stable home, even guidance on personal financial management.

The biggest hope is that if enough foster kids can be transformed into cyber warriors, we can help to permanently remove the stigma from the word foster, help kids wear foster as a badge of honor instead of shame, and give a new generation some real role models with whom they can truly relate.

The pilot program is being developed in Cincinnati, Ohio, with a team of local partners and supporters before it's introduced nationally. But Foster Warriors won't succeed unless the security community stands up and lets these kids know they'll be wanted and welcomed. You can help — with donations, sponsorships, or simply volunteering some of your time or skills. You can learn more at www.schooledinsecurity.org/foster-warriors. Or contact me directly via email by clicking the envelope icon under my photo. Join Foster Warriors and make a difference.

Related Content:

Neal O'Farrell has spent nearly four decades in global security and privacy. In the 1980s he led pioneering work in the field of advanced speech and data encryption, and while still in his twenties won the first contract to encrypt Ireland's entire national ATM network. His ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RichardL24
50%
50%
RichardL24,
User Rank: Apprentice
6/28/2019 | 11:06:05 AM
Big Fan
Thank you for this article as being in the cybersecurity training and workforce development business I have been having similar thoughts about how to give hope and careers to disadvantaged children.

I'm the father of nine children that I adopted from the Foster system in my home state. I also sit on the board of a residential program where a lot of kids in the system end up.

It's time to give them hope and the opportunity to make up for lost time and I want to be part of that. 

I just sent you an email and I'm hoping we can connect soon

 
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15073
PUBLISHED: 2019-11-20
An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15072
PUBLISHED: 2019-11-20
The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15071
PUBLISHED: 2019-11-20
The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail syste...
CVE-2019-6176
PUBLISHED: 2019-11-20
A potential vulnerability reported in ThinkPad USB-C Dock Firmware version 3.7.2 may allow a denial of service.
CVE-2019-6184
PUBLISHED: 2019-11-20
A potential vulnerability in the discontinued Customer Engagement Service (CCSDK) software version 2.0.21.1 may allow local privilege escalation.