homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. A Primer on Neurodiversity in Cybersecurity
370x370_jennifer-santiago.jpg
Jennifer E Santiago (Moderator)

A Primer on Neurodiversity in Cybersecurity

If you're wondering how neurodiversity and cybersecurity are related, we've got a virtual free Summit for you.

April 29, 2022

Neurodiversity in Cybersecurity Summit - banner


You may have noticed a groundswell of dialogue lately around the topic of neurodiversity. If you’re wondering what, exactly, that means, and how to talk about it, we’re here to help.

On May 12, SANS will host our first-ever Neurodiversity in Cybersecurity Summit. The Summit is Live Online and is free to attend.

Working Definitions

Neurodiversity is a broad term which refers to differences in processing and cognition found in people who are on the autism spectrum, have ADHD, dyslexia, dyscalculia, and/or Tourette Syndrome, for example. This list is not exhaustive, and a neurodivergent individual may have a single form of neurodiversity, or several in combination. “ND” is often used as shorthand for “neurodiversity” or “neurodivergent.”

Autism spectrum disorder (ASD), sometimes simply referred to as autism, is defined by the Autistic Self Advocacy Network (ASAN) as “a developmental disability that affects how we experience the world around us…Every autistic person experiences autism differently, but there are some things that many of us have in common.” Those things include struggles with executive function; strict adherence to routines; extra sensitivity to sensory input like bright lights, ambient noise, or smells; being uncomfortable with eye contact; or difficulty interpreting nonverbal conversational cues like facial expressions or body language.

Attention-deficit/hyperactivity disorder (ADHD) is marked by an ongoing pattern of inattention and/or hyperactivity-impulsivity that interferes with functioning or development, according to the National Institute of Mental Health. People with ADHD may experience any combination of symptoms of inattention, like having difficulty being organized or staying on task; hyperactivity, like fidgeting or excessive talking; and/or impulsivity, like interrupting conversations or inability to delay gratification.

Neurotypical (NT) refers to individuals whose brain function, sensory processing, and behavior are what is considered typical, not characterized by any neurodivergent condition.

Dyslexia, according to the International Dyslexia Association, “Dyslexia refers to a cluster of symptoms, that results in people having difficulties with specific language skills, particularly reading.” Dyslexia can also impact oral language skills, like pronunciation of words.

Dycalculia, as defined by the National Center for Learning Disabilities, is a learning difficulty that affects an individual’s ability to do basic arithmetic such as addition, subtraction, multiplication and division. Adults with dyscalculia often take longer when working with numbers and may be more prone to making mistakes in calculations.

Tourette Syndrome (TS) is characterized by tics, or involuntary, repetitive movements and vocalizations. “TS is a neurodivergent identity in its own right, but also commonly co-occurs with ADHD and OCD,” points out Nancy Doyle in a June 2021 article for Forbes.

How is this a cybersecurity topic?

There are something like 500,000 to 700,000 vacant cybersecurity jobs, depending who’s doing the estimating. And, although estimates vary here as well, somewhere from 60% to 80% of adults with ASD are unemployed or underemployed. And, as Camille Stewart has often reminded us, cybersecurity is national security. So while employers are struggling to fill roles, there are thousands of neurodivergent professionals whose talents aren’t being tapped, just because they may not communicate, socialize, or behave in the typically expected ways. This Summit is just one small way to close the gap between ND cybersecurity practitioners and the organizations who desperately need their skills. Corporations like Microsoft and Google are devoting efforts to employ neurodivergent individuals, as are government agencies.

What barriers still exist?

Pete Jarett, a UK-based educator and neurodiversity advocate who will be speaking at the Summit, wrote a great piece on neurodiversity and operating systems. We need to help employers understand the benefits of hiring people who are capable and talented, but are just using different software to get the job done. The International Dyslexia Association says, “dyslexia is a neurological condition caused by a different wiring of the brain.” Not faulty wiring, just different wiring.

But neurodivergent people are often casualties of people’s preconceived notions of what “normal” looks like. On her blog, The Real STEM Sadie, Sadie Gauthier, who is neurodivergent and has four rare chronic illnesses, posts about “not being disabled enough,” where neurotypical bosses and colleagues view ability as a binary trait, judging her on her healthy days and not understanding when she was unwell or unable to complete tasks she’d done well on other occasions. And it’s likely every autistic person has been told, at some point, “You don’t look autistic!”

It’s also important to remember that neurodiversity is just one part of someone’s identify. As ASAN points out on their website, “autistic people are people of color. Autistic people are immigrants. Autistic people are a part of every religion, every income level, and every age group. Autistic people are women. Autistic people are queer, and autistic people are trans. Autistic people are often many of these things at once.”

In his memoir Look Me in the Eye: My Life with Asperger’s, John Elder Robison describes his challenges with conversation.

I am tongue-tied when approaching people unless they speak to me first. If I do speak up, I often say something that’s rude or surprising… My conversational difficulties highlight a problem [those with ASD] face every day. A person with an obvious disability – for example, someone in a wheelchair – is treated compassionately because his handicap is obvious. No one turns to a guy in a wheelchair and says, “Quick! Let’s run across the street!” And when he can’t run across the street, no one says, “What’s his problem?” They offer to help him across the street. With me, though, there is no external sign that I am conversationally handicapped. So folks hear some conversational misstep and say, “What an arrogant jerk!”

To hear much more from neurodivergent professionals in their own words, join us for the Summit on May 12. If you are a neurodivergent person in cybersecurity and want to expand your network, check out:

WiCyS Neurodiversity Affiliate Logo
WiCyS Neurodiversity Affiliate

What did I miss, or get wrong?  SummitSpeakers@sans.org for feedback!  

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity Leadership

Related Content

Blog
leadership blog image.png
Cybersecurity Leadership
May 13, 2024
A Visual Summary of SANS Cybersecurity Leadership Summit 2024
Check out these graphic recordings created in real-time throughout the event for SANS Cybersecurity Leadership Summit 2024
No Headshot Available
Alison Kim
read more
Blog
NIS2_-_Blog_-_Transforming_SOC_Challenges_Into_Opportunities_340_x_340.jpg
Cybersecurity Leadership
May 12, 2024
NIS2: Transforming SOC Challenges Into Opportunities
To address NIS2 requirements, organizations must ensure they can detect and respond faster and quicker.
370x370_Maxim-Deweerdt.jpg
Maxim Deweerdt
read more
Blog
NIS2_-_Blog_-_The_Ripple_Effect-_NIS2_s_Impact_on_Cybersecurity_Practices_Across_the_EU_340_x_340.jpg
Cybersecurity Leadership
April 23, 2024
The Ripple Effect: NIS2's Impact on Cybersecurity Practices Across the EU
The new NIS2 Directive increases the scope of organizations that must comply.
370x370_Bojan-Zdrnja.jpg
Bojan Zdrnja
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn