More Women Cyber Security Professionals Needed

The pandemic has provided cyber criminals with a goldmine of opportunities from businesses pivoting online to millions of people having no choice but to work on the web at home and so work and life has become increasingly digital. This increase in online activities has given cyber criminals opportunities to exploit and steal often using phishing and other cyber attacks.

Currently, there are less than 20% female technology employee compared with 49%  of females across the whole UK economy. To deal with this increase in attacks and to improve our cyber security, more female cyber security professionals are needed who can provide businesses with the right skills to improve cyber security and help to keep organisations safer online.

Right now, the demand for cyber professionals hugely outweighs the supply. According to a UK  from the Government  Report Cyber security skills in the UK labour market 2020 on cyber skills, two-thirds of cyber firms have faced problems with technical cyber security skills gaps. This is either among existing staff or among job applicants, with a quarter saying that such skills gaps have prevented them from achieving business goals. “Approximately 653,000 businesses (48%) have a basic skills gap. That is, the people in charge of cyber security in those businesses lack the confidence to carry out the kinds of basic tasks laid out in the government-endorsed Cyber Essentials scheme, and are not getting support from external cyber security providers... The most common of these skills gaps are in setting up configured firewalls, storing or transferring personal data, and detecting and removing malware,” says the Report.

To create, inspire and educate the next generation of cyber leaders, the UK needs to highlight the benefits of embarking on a cyber security course. There needs to be a concerted effort to spotlight the wide range of potential career options that will be available to them, from security architects to information security analysts to data scientists.

Most people assume that a background in science, technology, engineering and mathematics (STEM) subjects is required to undertake a cyber security degree, but even if you studied history or English, you could still have a potential career in cyber security. Promoting a wider range of students to study cyber security  at university level will be key to achieving this.

What’s positive is that there is an appetite for change. For example, the Cyber First program run by GCHQ’ National Cyber Security Centre saw a 60% increase in girls for their summer course in 2020 compared with 2019. The Women in Technology Excellence Awards are open for nominations of outstanding women from around the world across categories including Digital Leader, Role Model and Transformation Leader of The Year.

GovUK:        NCSC:        Guardian:       Computing:         Infosecurity Magazine

You Might Also Read:

On International Women’s Day Only 10% Of Top Executives Were Female:

 

« US Intelligence Ignores Open Source Data
New Tool To Detect Microsoft 365 Compromises »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.

Tek Yantra

Tek Yantra

Empower your business with our adept IT specialists, delivering rapid, scalable, and resilient cloud-based solutions designed to spur innovation and elevate productivity.