8 More Women in Security You May Not Know but Should8 More Women in Security You May Not Know but Should
Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.
March 8, 2022
Most cybersecurity workforce experts agree that if the industry is ever going to crack the cybersecurity talent-gap problem, it first needs to bridge the gender divide. Women make up half of the world’s population, but they still comprise less than a quarter of today’s security jobs. Yet with the right training and recruitment, women can not only broaden the pool of potential talent, they also bring different capabilities and perspectives to the job than those of their male counterparts — the kind needed to inject fresh ideas into the industry.
The good news is that after years of advocacy from women's mentoring and professional groups, it appears the needle is slowly moving on this front. Whereas in 2013 industry analysts from Frost & Sullivan estimated the percentage of female professionals in cybersecurity at about 11%, the latest figures from (ISC)2 show that has risen to 24%. Industry groups, educational organizations, internal HR, and passionate security advocates — many of whom also happen to be women — have put their shoulders into the effort to keep bolstering this number.
It shows in the young and mid-career standouts who are making waves in the industry. Anecdotally, security conferences are seeing higher participation among women experts, and many of those who are getting a seat at the table are inviting their fellow females to join in.
In that spirit, Dark Reading showcases a few of the standouts who are coming into their own or gaining increased visibility through new endeavors. This is a continuation of an ongoing, if sometimes sporadic, series that we’ve run since 2018. To keep the recognition alive, we’ve also included a few updates on women previously highlighted.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023