Diversity In Cyber Security

Improving the diversity of the cyber security industry by hiring people from different backgrounds will allow information security teams to think and defend against concepts and attack methods they have never thought of before and significantly improve your organisation’s cyber online defenses.

Digital systems are a part of Britain's critical national infrastructure, and keeping them secure and resilient is more vital than ever. The NCSC Report on Decrypting Diversity details how over 85% of professionals working in cyber security are white, compared to under 15% from black, Asian or mixed ethic groups.

The Director of GCHQ Jeremy Fleming, recently told Britain’s largest forum on cyber security, CyberUK 2021, that “the UK will only be able to thrive in the digital era if we are able to draw people from all backgrounds to work together on these problems. Inclusion has become mission critical, not a nice to have... It’s vital to our intelligence and cyber security work. It’s not just the morally right thing to do, it’s smart business.”  

Two-thirds of the industry identifies as male, compared to 31% identifying as female, while over 84% of those surveyed identify as straight, compared with 10% who identified as LGBT. 

The NCSC Report says that, “over 40% of Black cyber security professionals feel they have experienced discrimination over their ethnicity in the past year. There are other, equally shocking, examples. They should be a source of deep shame for all in the industry, the kind of stark accounts which simply cannot be ignored.”  Not only does diversifying the cyber security industry help it better reflect the population, it can bring different ways of thinking and different skills to the table, and it could also help cyber security teams gain a better idea of how the malicious hacking operations they're trying to defend networks again work.

Improving diversity in cyber security teams should, therefore, be a key aim for organisations across the industry, because it can help protect people and businesses from a wider range of cyber threats.

It's also important to recognise that people can take different routes into cyber security, some might get qualifications from university or information security certifications, others might learn skills via online courses, some might even teach themselves entirely.

The Report says, “Gay and lesbian respondents reported feeling discriminated against over their sexual orientation at eight times the level of survey respondents as a whole. Female respondents reported nearly two and half times the level negative incidents as a result of their gender identity than the survey as a whole. “Given these findings, it is worrying to discover that the industry has low levels of incident reporting and resolution.... In the circumstances, it is little surprise that just over 9% of all those surveyed are considering changing employers or leaving the industry entirely.” 

NCSC:          iNews:        ZDNet:     FuentITech:     Digital Guardian:     Image: Unsplash

You Might Also Read: 

Psycho-Cyberchology:

 

 

« Russia Wants A Deal With The US On Cyber Security
Cyber Police Crack Hacker Group »

Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BSI

BSI

The BSI is the central IT security service provider for the federal government in Germany.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

MarkMonitor

MarkMonitor

MarkMonitor is a leading enterprise-level domain registrar trusted by organizations globally to establish an online presence and protect domain portfolios.