Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Closing the Gender Gap in Cybersecurity: 3 Critical Steps
Oldest First  |  Newest First  |  Threaded View
josephrovira
100%
0%
josephrovira,
User Rank: Apprentice
5/20/2016 | 3:29:56 PM
Women in Cybersecurit
It would be awesome to have more women in cybersecurity or in the information systems field in general. However, unlike what I am hearing about statistics and unbalanced gender representation, the real reason is that women are valuable in this field just by their ability to offer a rare but essential perspective that is often overlooked by any gender dominated field. I am well aware that cybersecurity and the IT profsession is not really "glamourous" or an exiciting field to be in and thus not appealing to many. Diversity in the cybersecurity field is key to an effective method to combat the constant asymmetrical threats that we face. We must be able to have the different persective that are offered by both genders and cultures in order to do the jobs we are genourously paid for. I know this job sucks when it comes to talking about what you do to anyone that is not a part of it, but that is the nature of our profession. You can always get involved in a decent hobby that you can talk to your friends about.
rstoney
50%
50%
rstoney,
User Rank: Strategist
5/23/2016 | 9:46:15 AM
Gender Gap
Perhaps I will be accused of being a luddite here, or not seeing "The Big Picture" -- but I really do not care about the gender gap.  

When I engage in my profession, either in person or online, during work hours or what I do on my own I really do not care about your chromosome composition.  What I care about is that you are highly proficent and willing to teach, proficient and willing to teach, or even just starting out and wanting to learn.  Or any place on the sliding scale.  Nodding towards current events - which bathroom you decide to use is inane useless details to me.

Would I like to see more women in the IT Security realm?  Of course.  Because that means we have a greater pool of what could be proficient people in an important field of work.  And that is the only point I care about.  

 
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
5/23/2016 | 10:22:01 AM
Re: Gender Gap
You hit all the major points of what I have been saying for a long time. Aside from the fact that there are disparities in different industry sectors with all physical architypes, a crusade to close gaps for the wrong reasons could be detrimental to women who actually want to get into the cybersecurity field.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:40:45 PM
Lack of Women in IT
For me, this starts from the early education and then the collage. There are not enough females in IT classes, so we do not expect there will be women in IT departments.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:42:43 PM
Re: Women in Cybersecurit
"It would be awesome to have more women in cybersecurity ..."

I would agree with this. Women being detail oriented and organized they would be quite successful in cybersecurity.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:46:06 PM
Re: Women in Cybersecurit
".. I know this job sucks when it comes to talking about what you do to anyone that is not a part of it ..."

I actually consider IT exciting. Especially last 20 years has been great and the progress that has been made in IT way overpassed all other major areas and it is exciting to be in IT.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:49:42 PM
Re: Gender Gap
"... Would I like to see more women in the IT Security realm?  Of course. ..."

I agree. I see it as balance between different perspectives. Women could bring better insight and organized approach to IT departments
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:53:08 PM
Re: Gender Gap
The way I want to take this is that gender gap is just one of the parameters, skills and abilities that women bring into IT sector is valuable. That is why more women in IT better outcome for IT departments.
josephrovira
50%
50%
josephrovira,
User Rank: Apprentice
5/23/2016 | 5:06:16 PM
Re: Women in Cybersecurit
I have been in this field for 34 years now and I can't think of anything that was really exciting. I can find many times that I have felt sheer panic and a sense of dread, nothing exciting in a good way. However, I am glad you can perhaps share some of your moments of excitement that would hopefully sway a promising student to go into our field.

Honestly, the main reason that I am in this field is that I am very good at it. Though it may be that I have just become jaded with it since I have never found it very challenging.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37436
PUBLISHED: 2021-07-24
Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing pers...
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...