Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

5/9/2018
12:00 PM
50%
50%

Millennials, Women May Bridge Cyber Talent Gap

Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020.

A survey of millennials and post-millennials in the US gives some optimism about the cybersecurity talent gap, which seems doomed to worsen due to perception challenges about industry careers, poor access to early training, and unrealistic job requirements.

Enterprise Strategy Group (ESG) polled 524 millennials and post-millennials in the US to learn their perspectives on the skill shortage. Data shows 68% consider themselves either a tech innovator (27%) or early adopter (41%). Technology drives this generation's education choices: 48% were part of a STEM program during their K-12 years and 82% plan to attend college after high school. Of the college hopefuls, 23% plan to study computer science and technology.

Part of the challenge in getting young people into cybersecurity is making them aware of the field. Nearly 70% have never taken a security class in school, and 65% said their school never offered a security course. "Don't know enough about this field/career path" was the most popular reason cited among those who were not interested in cybersecurity. Other reasons for poor interest included a lack of technical aptitude and level of education required in security.

Researchers wanted to learn how women will play a role in cybersecurity's future, so they parsed their data according to respondents' gender. What they found at first seems discouraging. Twice as many men than women plan to study engineering in college, twice as many men will pursue computer science, and twice as many men are considering IT careers.

However, some key nuggets indicate women could change the game in security. Female respondents showed quicker and higher rates of adoption for new technologies, with 52% of women stating this compared with 42% of men. More women have advanced tech such as virtual reality in their households, and more women indicated they have spent time using (and would spend more time using) these technologies. Ten percent more women plan to enroll in college.

It's worth noting two tech-related career fields equally interest men and women: video game development and, yes, cybersecurity. Women are more excited by security than men, with 57% of female millennials expressing excitement compared with 40% of male millennials.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
5/9/2018 | 1:43:18 PM
Sorry - but
Gee, as if that is all the available workforce?  I think there is a considerable pool of experienced MALE talent that can be drawn on well.  Firms always want a 22 year old Millenial with 34 years of experience with an H1-B if possible.  COME ON - this notion that the job gap can be filled with just two groups is nonsense.  
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5034
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave Legacy Pairing functionality of Nest Cam IQ Indoor version 4620002. A set of specially crafted weave packets can cause an out of bounds read, resulting in information disclosure. An attacker can send packets to trigger this vuln...
CVE-2019-5035
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker c...
CVE-2019-5036
PUBLISHED: 2019-08-20
An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially cr...
CVE-2019-8103
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...
CVE-2019-8104
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...