Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
A Fathers Perspective On The Gender Gap In Cybersecurity
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
mwalker871
mwalker871,
User Rank: Guru
10/1/2015 | 1:36:16 PM
No reason to drag feet on gender bias
Computing in general is an old boys club with the attendant male priviledge that keeps it that way. There is a bias and as long as we don't acknowledge it clearly and do what we each can do to break stereotype driven personnel decisions it will remain.

Sure there may be some inherent gender differences, but looking at the way things are today tells you nothing clearly. Social historical baggage clouds the view.

I could go on, but there is no reason to be satisfied with gradual change. That's just lazy thinking and reminds me of the excuses regarding civil rights.

I went to school with some bright girls who went on to engineering careers. It was clear they were expected to produce excellent results always or be dismissed as serious students.

Is that how you want life to go for your daughter?
levigundert
levigundert,
User Rank: Guru
10/1/2015 | 1:33:33 PM
Re: Gradual Change will come if meritted
Stratustician, I couldn't agree more about the need for role models, and "Lisbeth" is a fantastic example of a stereotype that isn't necessarily productive if the goal is increased participation in information security domains. Fortunately we do have some strong role models like yourself and hopefully over time the perceived "Lisbeth" character requirements cease to exist.

Thank you for commenting.  
levigundert
levigundert,
User Rank: Guru
10/1/2015 | 1:24:04 PM
Re: Gradual Change will come if meritted
RyanSepe, thank you for commenting. I agree that the goal should be to raise awareness of the career potential in information security. The goal isn't perfect parity between genders, but rather a growth trend in female participation over time which will elevate the long term performance of operational defense teams. 
Rookiewilliams99@gmail.com
[email protected],
User Rank: Apprentice
10/1/2015 | 11:22:30 AM
The gender gap in infosec
I agree with Levi in that the US government's numbers for females in the information security field (at almost 20%) is far higher than I've experienced personally.  5% is much closer to the number I see at conferences and seminars, if you disregard IT Audit related personnel.

That said, I'm not convinced this is a real problem unless there are some sort of artificial barriers to women entering this industry.  As we're always looking for more qualified practicioners women entering in higher numbers would certainly be welcomed, but how would one go about nudging females into the career, and why exactly should we do that?  

I agree the issue is larger than the narrow slice of infosec, but it seems that society is saying "follow your dreams" or "pursue your interests" and then turning around and saying "but more of you females should be interested in STEM careers."  As a father of male and female teenagers and an infosec practicioner myself, I've always presented my career positively and would welcome their interest in pursuing it, but I don't think either of them will end up in infosec.  At the local high school they have some great STEM-oriented classes that the school administration is really marketing to the female students, and yet the classes are still 80% male.

When I want help repairing my lawn mower or working on my car my daughter will turn me down almost every time, while my son will want to try to do the job by himself.  My son hates the one required foreign language class he has to take, while my daughter buys books and programs to teach herself 3 additional languages.

Is there something wrong that my daughter gravitates to linguistics while my son tends toward mechanical engineering when they both had virtually the same exposure and opportunities?  Does that represent a problem that needs resolved?  Isn't there a possiblity that the sexes have some inherent differences in their outlook on life, and shouldn't we allow that to happen?
Broadway0474
Broadway0474,
User Rank: Apprentice
9/30/2015 | 10:34:36 PM
Re: Gradual Change will come if meritted
These are all fascinating personal stories, shared after a great post. All around one of the best things I've read on this site. That said, I am hoping for a little clarification. Is part of the problem that tech in general -- whether IT or security --- is more sexist a field than, say, marketing or consulting?
nemocraig
nemocraig,
User Rank: Guru
9/30/2015 | 5:46:12 PM
I don't know anymore
I've dreamt of being in CyberSec for a really long time. Pretty much since I was an awkward teen in the early 2000's. I read, research, talk about joining the industry. Heck, I even tried to get into uni so I could study it. But all I hear is no, or your not good/smart enough. I'm used to those remarks. I have 8 years of solid work experience in a number of IT roles. I currently work in a high school and have contact with students. staff and administration and I understand the need for people in CyberSec. I give them the best information I can but as for possibly advancing into the industry, I doubt I will get this opportunity. I've applied for scholarships, loans, credit in order to go to training courses and bootcamps but I always get denied. With no family support and in a job where I barely make ends meat, I cannot afford to get the training. I've looked for mentoring. I've looked for jobs but you just get to the point where you've just got to let the dream go.

Good luck ladies.
Stratustician
Stratustician,
User Rank: Moderator
9/30/2015 | 2:26:43 PM
Re: Gradual Change will come if meritted
Great point. I think right now the interest in cybersecurity in particular is a bit funny for girls due to the strange role model disparancy that exists.  For example, if you look at more recent pop culture, it's natural for many girls to think that you need a bit of a tougher edge much like Lisbeth from the Girl with the Dragon Tattoo.  Seems a little funny, but as a woman working in the field, I do get lots of people trying to draw a connection between what I do (help organizations put together security strategies) and the type of character from that book.  In reality, when I got interested in cybersecurity, it was because of all the books I read on the history of cryptography and the work that many women did, especially in WWII.  These are the role models I think many girls need, but sadly they don't get as much recognition as it's more popular to focus on hacker culture which might scare many girls off as being too harsh or too technical of a career path.

Either way, we definitely need more role models, and while we are nowhere near there yet (In my experience I am a perfect example of a women sitting on all male IT security teams), we just need some more strong role models from all points of history to show girls that women have historically helped with great progress in cybersecurity, we just often get overlooked by the sheer number of our male peers.
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2015 | 11:03:05 AM
Gradual Change will come if meritted
As I said in the previous article referenced there is disparity everywhere. Its our moral fabric as a society not to prohibit a person from pursuing a field that interests them. I do believe that more education around information technology and information security needs to become more prevalent within schools. But I doubt that this will result in closing the gender gap within these fields. My evidence is that even though education has been barren in this type of education it would result in a disparity of all genders from these fields as all genders/races/ethinicitys are schooled collectively. As someone who believes that people should do what they have interest in, I support women and men trying to attain any goal that they have. But from a early guidance point the first question should be "What are you interested in?" From that, positions and fields should be explained to compliment those interests. There should be no steering in any which way from those interests.

At this point, no one is restricted from attaining a job due to these physical data sets. It has been this way for a long time. Because of this if more women become interested in infosec and IT the change will come but will be gradual. But I think trying to invoke change because there is a disparity of this type is foolish and in the end may detract from what the persons true interests are. In the end, the quest to not steer an individual from a cause they are truly interested in may be violated as a result of trying to close the disparity. In essence, the ideal end goal may be riddled with hypocrisy. 
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31017
PUBLISHED: 2022-06-25
Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the serve...
CVE-2022-31016
PUBLISHED: 2022-06-25
Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated A...
CVE-2022-24893
PUBLISHED: 2022-06-25
ESP-IDF is the official development framework for Espressif SoCs. In Espressif&acirc;&euro;&trade;s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can resul...
CVE-2022-29168
PUBLISHED: 2022-06-25
Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering `@mentions` in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and executed in the context of the victim allowi...
CVE-2019-25071
PUBLISHED: 2022-06-25
** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to execute commands remotely. Exploit details have...