• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

Girl Power: Women Continue to Be a Growing Force in the Cybersecurity Industry

Statistics and record high attendance at recent Women in CyberSecurity conference indicate an uptick in the number of women in the cybersecurity workforce.

April 24, 2019 Lisa Montgomery Leave a Comment

cybersecurity

Cybersecurity Ventures predicts that women will represent more than 20 percent of the global cybersecurity workforce by the end of 2019.

Cybersecurity Ventures joins other research firms noticing an uptick of women in cybersecurity. Forrester Research analyst Stephanie Balaouras, who co-authored a recent report with fellow analyst Claire O’Malley, told DarkReading that she believes women now represent somewhere between 15-20 percent of the industry if you include security and risk, privacy, and compliance and audit functions.

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019, compared with 13 percent in 2017. This is consistent with new research from Boardroom Insiders which states that 20 percent of Fortune 500 global chief information officers (CIOs) are now women — the largest percentage ever.

 

Add this to the fact that the recent Women in CyberSecurity conference recorded a record attendance of more than 1,300 women, and its clear that cybersecurity is attracting a growing number of female employees. As more women and girls have discovered and entered the cybersecurity arena the need to fuel that flame has been a priority for the Women in CyberSecurity (WiCyS) organization, who hosted the Women in CyberSecurity event March 28-30, in Pittsburgh, Pennsylvania.

 

In its sixth year, the three-day WiCyS conference was conceived through a grant that yielded nearly 400 participants. This year’s attendance surpassed last year’s by roughly 200. When the event was open for public registration, it sold out in 45 minutes and had over 400 women on the waitlist.

 

Part of the appeal is not only the scholarship opportunities — WiCyS has doled out $1.8 million over six years — but also the programming at this unique conference. New this year was a career village, where cybersecurity professionals gathered to have mock interviews, presented a resume clinic, had office hours with mentors and received a professional headshot for their LinkedIn profiles. The career fair had 90 vendors ready to receive resumes while WiCyS student chapters and affiliates hosted Meetups.

 

Attendees were treated to five dynamic keynote speakers that included Patricia Denno, vice president for Global Intelligence Operations, Enterprise Cybersecurity at Fidelity Investments; Dr. Dawn Beyer, senior fellow at Lockheed Martin; Dr. Lorrie Faith Cranor, director and Bosch Distinguished professor in Security and Privacy Technologies of CyLab and the FORE Systems professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University; Wendy Nather, head of the Advisory CISO team at Duo Security (now Cisco); and Michele Schochet, director of Security at Facebook.

Next year’s event will be held at the Gaylord Rockies Resort in Denver, Colo., March 12-14.

Tagged With: Corporate, Cyber Security, Data Security

Related Content:

  • No More Ransom SMBs Are Grappling with Paying Ransom Demands
  • Tenable Cloud Security with Agentless Assessment and Live Results Tenable Announces Cloud Security Agentless Assessment for Faster…
  • Zerto AWS Zerto Joins AWS ISV Workload Migration Partner Program
  • 1Passsword 8 for iOS and Android 1Password Rolls Out New iOS, Android Platform

Free downloadable guide you may like:

  • Blueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.