Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

A Fathers Perspective On The Gender Gap In Cybersecurity
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
User Rank: Ninja
9/30/2015 | 11:03:05 AM
Gradual Change will come if meritted
As I said in the previous article referenced there is disparity everywhere. Its our moral fabric as a society not to prohibit a person from pursuing a field that interests them. I do believe that more education around information technology and information security needs to become more prevalent within schools. But I doubt that this will result in closing the gender gap within these fields. My evidence is that even though education has been barren in this type of education it would result in a disparity of all genders from these fields as all genders/races/ethinicitys are schooled collectively. As someone who believes that people should do what they have interest in, I support women and men trying to attain any goal that they have. But from a early guidance point the first question should be "What are you interested in?" From that, positions and fields should be explained to compliment those interests. There should be no steering in any which way from those interests.

At this point, no one is restricted from attaining a job due to these physical data sets. It has been this way for a long time. Because of this if more women become interested in infosec and IT the change will come but will be gradual. But I think trying to invoke change because there is a disparity of this type is foolish and in the end may detract from what the persons true interests are. In the end, the quest to not steer an individual from a cause they are truly interested in may be violated as a result of trying to close the disparity. In essence, the ideal end goal may be riddled with hypocrisy. 
User Rank: Moderator
9/30/2015 | 2:26:43 PM
Re: Gradual Change will come if meritted
Great point. I think right now the interest in cybersecurity in particular is a bit funny for girls due to the strange role model disparancy that exists.  For example, if you look at more recent pop culture, it's natural for many girls to think that you need a bit of a tougher edge much like Lisbeth from the Girl with the Dragon Tattoo.  Seems a little funny, but as a woman working in the field, I do get lots of people trying to draw a connection between what I do (help organizations put together security strategies) and the type of character from that book.  In reality, when I got interested in cybersecurity, it was because of all the books I read on the history of cryptography and the work that many women did, especially in WWII.  These are the role models I think many girls need, but sadly they don't get as much recognition as it's more popular to focus on hacker culture which might scare many girls off as being too harsh or too technical of a career path.

Either way, we definitely need more role models, and while we are nowhere near there yet (In my experience I am a perfect example of a women sitting on all male IT security teams), we just need some more strong role models from all points of history to show girls that women have historically helped with great progress in cybersecurity, we just often get overlooked by the sheer number of our male peers.
User Rank: Guru
9/30/2015 | 5:46:12 PM
I don't know anymore
I've dreamt of being in CyberSec for a really long time. Pretty much since I was an awkward teen in the early 2000's. I read, research, talk about joining the industry. Heck, I even tried to get into uni so I could study it. But all I hear is no, or your not good/smart enough. I'm used to those remarks. I have 8 years of solid work experience in a number of IT roles. I currently work in a high school and have contact with students. staff and administration and I understand the need for people in CyberSec. I give them the best information I can but as for possibly advancing into the industry, I doubt I will get this opportunity. I've applied for scholarships, loans, credit in order to go to training courses and bootcamps but I always get denied. With no family support and in a job where I barely make ends meat, I cannot afford to get the training. I've looked for mentoring. I've looked for jobs but you just get to the point where you've just got to let the dream go.

Good luck ladies.
User Rank: Apprentice
9/30/2015 | 10:34:36 PM
Re: Gradual Change will come if meritted
These are all fascinating personal stories, shared after a great post. All around one of the best things I've read on this site. That said, I am hoping for a little clarification. Is part of the problem that tech in general -- whether IT or security --- is more sexist a field than, say, marketing or consulting?
[email protected],
User Rank: Apprentice
10/1/2015 | 11:22:30 AM
The gender gap in infosec
I agree with Levi in that the US government's numbers for females in the information security field (at almost 20%) is far higher than I've experienced personally.  5% is much closer to the number I see at conferences and seminars, if you disregard IT Audit related personnel.

That said, I'm not convinced this is a real problem unless there are some sort of artificial barriers to women entering this industry.  As we're always looking for more qualified practicioners women entering in higher numbers would certainly be welcomed, but how would one go about nudging females into the career, and why exactly should we do that?  

I agree the issue is larger than the narrow slice of infosec, but it seems that society is saying "follow your dreams" or "pursue your interests" and then turning around and saying "but more of you females should be interested in STEM careers."  As a father of male and female teenagers and an infosec practicioner myself, I've always presented my career positively and would welcome their interest in pursuing it, but I don't think either of them will end up in infosec.  At the local high school they have some great STEM-oriented classes that the school administration is really marketing to the female students, and yet the classes are still 80% male.

When I want help repairing my lawn mower or working on my car my daughter will turn me down almost every time, while my son will want to try to do the job by himself.  My son hates the one required foreign language class he has to take, while my daughter buys books and programs to teach herself 3 additional languages.

Is there something wrong that my daughter gravitates to linguistics while my son tends toward mechanical engineering when they both had virtually the same exposure and opportunities?  Does that represent a problem that needs resolved?  Isn't there a possiblity that the sexes have some inherent differences in their outlook on life, and shouldn't we allow that to happen?
User Rank: Guru
10/1/2015 | 1:24:04 PM
Re: Gradual Change will come if meritted
RyanSepe, thank you for commenting. I agree that the goal should be to raise awareness of the career potential in information security. The goal isn't perfect parity between genders, but rather a growth trend in female participation over time which will elevate the long term performance of operational defense teams. 
User Rank: Guru
10/1/2015 | 1:33:33 PM
Re: Gradual Change will come if meritted
Stratustician, I couldn't agree more about the need for role models, and "Lisbeth" is a fantastic example of a stereotype that isn't necessarily productive if the goal is increased participation in information security domains. Fortunately we do have some strong role models like yourself and hopefully over time the perceived "Lisbeth" character requirements cease to exist.

Thank you for commenting.  
User Rank: Guru
10/1/2015 | 1:36:16 PM
No reason to drag feet on gender bias
Computing in general is an old boys club with the attendant male priviledge that keeps it that way. There is a bias and as long as we don't acknowledge it clearly and do what we each can do to break stereotype driven personnel decisions it will remain.

Sure there may be some inherent gender differences, but looking at the way things are today tells you nothing clearly. Social historical baggage clouds the view.

I could go on, but there is no reason to be satisfied with gradual change. That's just lazy thinking and reminds me of the excuses regarding civil rights.

I went to school with some bright girls who went on to engineering careers. It was clear they were expected to produce excellent results always or be dismissed as serious students.

Is that how you want life to go for your daughter?
User Rank: Guru
10/1/2015 | 1:57:30 PM
Re: I don't know anymore
Nemocraig, I'm sorry to hear that people are providing such negative feedback. I don't think you should let the dream go. In the words of Walt Disney ""If you can dream it, you can do it."

I don't know your exact situation, but I do know that there are a lot of employers who need qualified candidates with a strong portfolio of work. Forget about the classes and certifications and focus on building your skills. If you're determined to succeed here are two suggestions:

1. Start a blog and regularly chronicle your journey which will help publicly demonstrate your security knowledge and skills. For inspiration and a testament to the power of patience and persistence check out the Year of Python project.

2. Network within open security communities. Start with your local OWASP chapter. These types of forums are invaluable resources to meet like minded people who share your passion across the full spectrum of skill levels.

Thank you for your comment.
User Rank: Guru
10/1/2015 | 2:06:26 PM
Re: Gradual Change will come if meritted
Broadway0474, thanks for the feedback. Related to your question, everyone's experience is different and it's difficult to make broad generalizations about sexism in the industry. In my experience, the male dominated technology industry has produced regrettable bits of culture (as mentioned in the article) that are counterproductive to increasing the perception that information security is a desirable venue for women.
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.