Diversity In Cyber Security

Improving the diversity of the cyber security industry by hiring people from different backgrounds will allow information security teams to think and defend against concepts and attack methods they have never thought of before and significantly improve your organisation’s cyber online defenses.

Digital systems are a part of Britain's critical national infrastructure, and keeping them secure and resilient is more vital than ever. The NCSC Report on Decrypting Diversity details how over 85% of professionals working in cyber security are white, compared to under 15% from black, Asian or mixed ethic groups.

The Director of GCHQ Jeremy Fleming, recently told Britain’s largest forum on cyber security, CyberUK 2021, that “the UK will only be able to thrive in the digital era if we are able to draw people from all backgrounds to work together on these problems. Inclusion has become mission critical, not a nice to have... It’s vital to our intelligence and cyber security work. It’s not just the morally right thing to do, it’s smart business.”  

Two-thirds of the industry identifies as male, compared to 31% identifying as female, while over 84% of those surveyed identify as straight, compared with 10% who identified as LGBT. 

The NCSC Report says that, “over 40% of Black cyber security professionals feel they have experienced discrimination over their ethnicity in the past year. There are other, equally shocking, examples. They should be a source of deep shame for all in the industry, the kind of stark accounts which simply cannot be ignored.”  Not only does diversifying the cyber security industry help it better reflect the population, it can bring different ways of thinking and different skills to the table, and it could also help cyber security teams gain a better idea of how the malicious hacking operations they're trying to defend networks again work.

Improving diversity in cyber security teams should, therefore, be a key aim for organisations across the industry, because it can help protect people and businesses from a wider range of cyber threats.

It's also important to recognise that people can take different routes into cyber security, some might get qualifications from university or information security certifications, others might learn skills via online courses, some might even teach themselves entirely.

The Report says, “Gay and lesbian respondents reported feeling discriminated against over their sexual orientation at eight times the level of survey respondents as a whole. Female respondents reported nearly two and half times the level negative incidents as a result of their gender identity than the survey as a whole. “Given these findings, it is worrying to discover that the industry has low levels of incident reporting and resolution.... In the circumstances, it is little surprise that just over 9% of all those surveyed are considering changing employers or leaving the industry entirely.” 

NCSC:          iNews:        ZDNet:     FuentITech:     Digital Guardian:     Image: Unsplash

You Might Also Read: 

Psycho-Cyberchology:

 

 

« Russia Wants A Deal With The US On Cyber Security
Ukraine Cyber Police Crack Hacker Group »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

4ARMED

4ARMED

4ARMED services cover the end-to-end experience of securing modern software, from design and build through to deploy and test.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.