Very Few Women Are CISOs

 There is a huge gender crisis in for jobs in the growing cyber security industry, with men holding 87 per cent of the chief information security officer (CISO) roles at Fortune 500 companies, a new report has revealed. 

According to the global market research firm Forrester, the CISO role is dominated by men and Fortune 20 companies fare a bit worse, with only two female CISOs.

"Calling a discrepancy this large a gender gap is a clear understatement. This is an emergency signal warning us that the cybersecurity industry has major issues welcoming, developing, and promoting female cybersecurity talent," said Jeff Pollard. Principal Analyst. 

"It's difficult to sympathise with those claiming talent shortage challenges when roughly half of the population is so underrepresented," he added. 

Among Fortune 500 companies, 45 per cent CISOs have MBAs, demonstrating the growing need for CISOs to understand, speak and think in business terms despite technology backgrounds. Only 11 per cent of Fortune 500 CISOs list a military background, with only 4 per cent previously employed by law enforcement, the report noted. 

"Fortune 500 CISOs have longer tenure than expected at four years, which is plenty of time to strategise, develop plans, execute, and look ahead to the next step in their career path," it added. 

Securing the role of CISO proves to be difficult for longstanding employees. Nearly 59 per cent of CISOs were external hires with that number jumping to 64 per cent in Fortune 100 companies. 

While Fortune 100 companies are reluctant to hire rookie CISOs, Fortune 500 companies are much more interested in individuals who are new to the role, with rookies making up 2/3 of Fortune 500 CISOs. 

Economic Times:

You Might Also Read:

Room At The Top For Women In Tech:

Difficult: Attracting Women To Cybersecurity:


 

 

« US Defense Contractors Stole Images From UK Secret Surveillance Station
Popular Streaming Sites Secretly Mine Cryptocurrency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.