SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news
Story image

Where to from here? Women in cybersecurity speak up

By Kai Ping Lew
Fri 8 Mar 2019
FYI, this story is more than a year old

For this year’s International Women’s Day, the theme is #BalanceforBetter - focusing on encouraging a more gender-balanced world. 

Lack of representation, the glass ceiling, a gender pay gap and toxic attitudes in the workplace are just a few of the challenges faced by women working in technology today.

International Women’s Day is an opportunity to reflect on how far the industry has come in treating women more equally, but also to rally together and put measures in place to improve the situation for future generations on the cusp of entering the workforce.

Here are what women working in cybersecurity have to say: 

Ping Identity A/NZ marketing manager Vivienne Horsfall

Attracting women into IT starts from the grassroots.

Changing the perception of STEM programs in school is paramount.

Programs must be inspirational, relevant and capture the imagination while evoking an intrinsic 'coolness'.

Providing influential female role models and mentors is extremely powerful as girls can project their future self.

Getting excited about the application of STEM in the real world is an important element to capture their imagination.

These experiences must be relevant to the different development stages to have greater appeal. For example, the younger girls tend to want to have fun so an excursion to a theme park working alongside engineers to understand the design and technology of building a roller coaster is appealing.

As they mature there tends to be increased consciousness of the world around them so investigating technologies that are saving the world - cleaning water supplies and our oceans becomes more relevant and finally playing with the technologies that are changing our lives such as robotics & AI.

The workplace itself is changing and as more companies embrace and honour their mantra and truly understand the benefits of a diverse workforce, women will feel valued and the domino effect will prevail.

Aura Information Security virtual security consultant Petra Smith

The cybersecurity skills shortage is approaching three million people globally but less than 20% of the current workforce in the industry are women.  

This comes at a time when analysis from AustCyber suggests that a shortage in Australia’s cybersecurity workforce may be costing the country more than $400 million in lost revenue and salaries and predicting that we may need 17,600 more cybersecurity workers by 2026.

Diverse teams are better at solving problems and in an industry that's all about solving complex problems, the lack of diversity another business risk.

So how do we solve the problem of gender inequality in technology?  

Representation matters.

Women and gender minorities need to see people like them succeeding.

It isn't enough to interest young women to enter the industry.  

We also need to break down the barriers that keep women from advancing and becoming tomorrow's role models.   

LogRhythm Asia Pacific and Japan senior regional marketing director Joanne Wong

While we’ve made good progress in improving gender equity in the workplace, there's still a long way ahead towards achieving greater gender diversity in our technology talent pool.

To help strike the balance, we will need to rally both organisations and individuals.

From an organisational level, companies will have to set the stage to help women acquire tech-related skills.

These organisations can pave the way for women to either shift their careers or develop a hybrid skillset, marrying their current skills with technology.  

For example, a finance manager can learn analytics which may be relevant for fintech companies.

On the individual level, it is important for women to adopt a mindset of lifelong learning and constantly upskill to stay relevant.

In a fast-moving environment where organisations are going digital, cybersecurity know-how is becoming an increasingly vital skill set for any employee.

Women who are willing to learn this skill will be able to get an edge over the others and in fact, play a significant role to help the company grow.

Gender fairness at the workplace is a big ambition but definitely one that is achievable.

As a cybersecurity professional, I believe technology will be the heart of some of the biggest changes in the next decade.

Artificial Intelligence will be a huge enabler but we will still need irreplaceable abilities such as human instinct and experience to help us discern false positives from true cyber incidents. Women will be able to harness their 'women's intuition' by giving a different perspective based on their life experiences and wisdom.

It is those who are able to leverage both technology and personal skill sets that will truly stand out from the crowd.

ExtraHop security product marketing senior director Barbara Kay

The need for both male and female cybersecurity professionals creates a great, reasonably level playing field.

Today’s youth are growing up surrounded and buffeted by security and privacy concerns.

Using tools like Khan Academy and, anyone can get more comfortable with the technical components and then layer on understanding of the security concepts.

Gaining a certification in security is also a way to establish credibility - and frankly this space is starved for people.

Bring your curiosity and you will find more environments using tools and automation to facilitate effective workflows and an environment that enhances skill development on the job.

When it comes to cybersecurity, learning never stops for both men and women.

CQR Consulting senior security specialist Shannon Campbell

Born in the 60s the term “Information technology” applied to the amazing ability to store and index data in place.

The focus switched to the evolving IT space where coding created capability and then hackers broke the code.  

Today, this coding and the hacking focus and stigma of sitting behind a desk staring at a computer all day is what girls believe “being in IT” is all about.

My version of IT is much wider, sexier and much more involved than coding and hacking.

The ‘IT’ space has evolved rapidly.  

 We have the world at our fingertips, we are interconnected and it is an essential enabler of business. Do we need to change the name of IT to something more representative of today to inspire?

By changing the name, can we reach a whole new generation of girls and young women who want to be communicators, problem solvers and global entrepreneurs in an integrated corporate environment?  

Can we help companies build empires, market goods all over the world, secure secrets, create effective and efficient human processes to support this critical enabler?  

This new world view must be mentored in the workplace and marketed by women to schools and universities to capture the interest of the next generation and leave them with powerful images of the possible.

Real life stories from real women in ‘IT’ will really help in explaining what was the outcome that was achieved by my contribution.  

One day I can be reviewing a corporate network to assist executives with a holistic view of people, process and systems to support decision making, smart investments and company growth, the next day assessing the complex business and information communication requirements of a fully integrated jet using satellite communications, airport ground systems, people and process or helping deliver a secure and manageable data store assist in the management and safety of women in hiding from abusive partners.

This approach could shape the education pathway where Information communication technology skills are seen in multiple streams (not just seen as STEM),  align with business and personal goals and enable girls and young women to visualise outcomes much bigger than coding and hacking.

The success of the integrated corporate environment requires a holistic approach to business (including computers, risk, security, people).  

You can be a master of one or generalist.

It’s not just ‘IT’, it’s not just for coders and hackers.

There a real skills shortage in information communication technology corporate integration experts.

It’s about business goals, communication, risk, security and money at all levels of business.

SolarWinds head geek Destiny Bertucci

International Women’s Day is here, and it’s great to see that year after year, it’s growing in recognition and importance.

In my work, I’m already fortunate to be surrounded by women.

And the good news is that—looking at the wider industry—I can see change is afoot, particularly in encouraging the next generation of female leaders in cybersecurity.

Because I’m so passionate about cybersecurity, and because I’m a mother myself, I feel that STEM programs can help many girls get started in IT.

Just a few weeks ago in Sydney, the Australian Computing Academy (ACA) announced the launch of the Schools Cyber Security Challenges as part of the curriculum for Australian high school students. Initiatives like these will ignite a passion in young children—especially girls—to work in IT and phase out any question of gender equality in the future.

Ultimately, working in IT comes down to a passion for problem-solving, day in and day out. Cybersecurity needs people who love to read and find answers; developers to help create new ways to block threats and help protect data in every sector; and, of course, a dose of charisma and good relationship-building skills go a long way, particularly when driving security policies within an organisation.

International Women’s Day is not only a great reminder for people to take practical steps to address the ongoing gender imbalance we face in certain industries and countries, but also that women can break glass ceilings and soar in any capacity.

Related stories
Top stories
Story image
Ivanti and Lookout bring zero trust security to hybrid work
Ivanti and Lookout have joined forces to help organisations accelerate cloud adoption and mature their zero trust security posture in the everywhere workplace.
Story image
BeyondTrust integrates Password Safe solution with SailPoint
BeyondTrust has announced the integration of BeyondTrust Password Safe with SailPoint identity security offerings.
Story image
Absolute Software expands Secure Access product offering
Absolute Software is enhancing its Secure Access product portfolio, enabling minimised risk exposure and optimised user experiences in the hybrid working environment.
Story image
Tech job moves
Tech job moves - Datacom, Micro Focus, SnapLogic and VMware
We round up all job appointments from May 6-12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Three key security challenges facing the Australian insurance industry 
Insurance companies must ensure they proactively address security challenges and protect the privacy of customer data.
Story image
Artificial Intelligence
ForgeRock releases Autonomous Access solution powered by AI
ForgeRock has officially introduced ForgeRock Autonomous Access, a new solution that uses AI to prevent identity-based cyber attacks and fraud.
Story image
Zerto unveils updates to ransomware recovery capabilities
"Organisations face increased risks from the volume and sophistication of ransomware attacks prevalent today."
Story image
Tech job moves
Tech job moves - Cisco, Hitachi Vantara, Tricentis & Zscaler
We round up all job appointments from April 28 - May 5, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Apple, Google and Microsoft expands plans to get rid of passwords
FIDO Alliance says the world is closer to not relying on passwords after Apple, Google and Microsoft expands their support for a passwordless sign-in standard.
Story image
HackerOne launches Attack Resistance Management solution
HackerOne has launched Attack Resistance Management - a new category of security solution that targets the root causes of the attack resistance gap. 
Story image
Anniversaries remind us to review identity risks
World Password Day provides a timely reminder for ordinary citizens and organisations to stop and think about the risks associated with digital identities.
Story image
Public Cloud
Radware announced launch of CNP spinoff SkyHawk Security
“We recognise the growing opportunities in the public cloud security market and are planning to capitalise on them."
Story image
Secure access service edge / SASE
Versa Networks recognised as SASE leader in Govie Awards
Versa Networks has announced its SASE offering has been recognised in The Govies Government Security Awards competition by Security Today magazine.
Story image
$1 million in cyber skills to stop $100 million in cybercrime
"It is important that the next generation across all industries, including manufacturing, are skilled in cybersecurity."
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
CyberArk launches $30M investment fund to advance security
CyberArk has announced the launch of CyberArk Ventures, a $30 million global investment fund dedicated to advancing the next generation of security disruptors.
Story image
A10 Networks finds over 15 million DDoS weapons in 2021
A10 Networks notes that in the 2H 2021 reporting period, its security research team tracked more than 15.4 million Distributed Denial-of-Service (DDoS) weapons.
Story image
Microsoft unveils three new security managed services
Security Experts includes three new managed services, Defender Experts for Hunting, Defender Experts for XDR, Security Services for Enterprise.
Story image
Akamai and Fujitsu team up to protect A/NZ orgs against threats
Akamai Technologies and Fujitsu Australia and New Zealand have entered a strategic relationship to assist organisations in the region.
Story image
Fortinet sees 34% revenue increase in latest financial results
Fortinet has released its financial results for the first quarter ended March 31, 2022, seeing a total revenue increase of 34.4% compared to the same quarter last year.
Story image
Ingram Micro Cloud adds Bitdefender solutions to marketplace
Ingram Micro Cloud has announced the expanded availability of Bitdefender solutions on the Ingram Micro Cloud Marketplace.
Story image
Exterro adds advanced capabilities to digital forensic tool
The launch is in-line with Exterro’s investment in the FTK product line, and underscores the company's commitment to the digital forensics.
Story image
Developments in phishing and how to protect your business
Phishing, the practice of sending malicious emails to encourage users to perform actions that benefit an attacker, is a key security concern for modern businesses due to its prevalence and impact.
Story image
Blue Prism
Blue Prism Desktop uses IA to defend against vulnerabilities
SS&C Blue Prism Desktop aims to help protect businesses against vulnerabilities, using a combination of security measures and intelligent automation tech.
Story image
Video: 10 Minute IT Jams - An update from IronNet
Michael Ehrlich joins us today to discuss the history of IronNet and the crucial role the company plays in the cyber defence space.
Story image
Fortinet training edges toward closing cybersecurity gap
The Fortinet Training Institute has made significant progress in closing the cybersecurity skills gap, on track to train one million people by 2026.
Story image
Mitiga discovers potential hidden dangers in Google Cloud Platform’s (GCP) cloud control plane
The company also says that there is significant risk in cloud development caused by not recognising the differences between cloud and traditional definitions of common architecture terms.
Story image
Use of malware, botnets and exploits expands in Q1 2022
"As zero-day attacks and other vulnerabilities among companies like Google and Microsoft come to light, threat actors are quickly adjusting their tactics."
Story image
Google reveals new safety and security measures for users
Google's new measures include automatic two step verification, virtual cards and making it easier to remove contact information on Google Search results.
Story image
Palo Alto Networks says ZTNA 1.0 not secure enough
Palo Alto Networks is urging the industry to move to Zero Trust Network Access 2.0 because previous versions have major gaps in security protection.
Story image
Odaseva expands in APAC and UK with more security features
Odaseva, a data platform for Salesforce, is establishing new headquarters in London as well as a new data center in India.
Story image
Artificial Intelligence
Updates from Google Workspace set to ease hybrid working troubles
Google Workspace has announced a variety of new features which will utilise Google AI capabilities to help make hybrid working situations more efficient and effective.
Story image
HubSpot launches 'The Great Upskill' week to inspire learning
Brands across APAC including Google ANZ, MessageMedia, Meltwater, Seismic and Aircall, will give their employees a full workday to dedicate to upskilling.
Story image
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Companies rushing to secure print infrastructure
As the pandemic prioritised communication channels and the shift to remote work, IT departments fell behind in updating the security of print and IT infrastructure.
Story image
Appian awarded billions in damages against Pegasystems Inc.
Appian has been awarded USD$2.036 billion in damages against Pegasystems Inc as the result of a jury verdict in the Circuit Court for Fairfax County, Virginia.
Story image
Employee retention increasingly important - automation may help
"Technologies like automation can free workers time, enable a better work-life balance, and create vastly improved efficiencies."
Story image
Sophos named Gartner Peer Insights Customers Choice for network firewalls
The company earned the highest overall customer rating among vendors with at least 150 verified customer reviews.
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Application Security
Data Theorem launches "industry first" attack surface management solution
"No solution uses full-stack application runtime analysis and dynamic inventory discovery to support the challenges around vendor management."
Story image
Sharp increase in phishing as cybercriminals leverage SEO to lure victims
"Malware lurking everywhere, from cloud apps to search engines, leaving organisations at greater risk than ever before."
Story image
Digital Transformation
Physical security systems guide the hybrid workplace to new heights
Organisations are reviewing how data gathered from their physical security systems can optimise, protect and enhance their business operations in unique ways.
Story image
Global bot security market to reach US$2.5 billion by 2032
The global bot security market to reach US$2.5 billion by 2032 driven by a growing need for cyber security, according to a new report.
Story image
New report reveals evolving techniques targeting cloud-native environments
Companies are adopting cloud-native technologies faster than ever before. Unfortunately, with new technology comes new threats and challenges.