homepage
Open menu Go one level top
  • Train and Certify
    • Get Started in Cyber
    • Courses & Certifications
    • Training Roadmap
    • Search For Training
    • Online Training
    • OnDemand
    • Live Training
    • Summits
    • Cyber Ranges
    • College Degrees & Certificates
    • NICE Framework
    • DoDD 8140
    • Specials
  • Manage Your Team
    • Overview
    • Security Awareness Training
    • Voucher Program
    • Private Training
    • Workforce Development
    • Skill Assessments
    • Hiring Opportunities
  • Resources
    • Overview
    • Reading Room
    • Webcasts
    • Newsletters
    • Blog
    • Tip of The Day
    • Posters
    • Top 25 Programming Errors
    • The Critical Security Controls
    • Security Policy Project
    • Critical Vulnerability Recaps
    • Affiliate Directory
  • Focus Areas
    • Blue Team Operations
    • Cloud Security
    • Digital Forensics & Incident Response
    • Industrial Control Systems
    • Leadership
    • Offensive Operations
  • Get Involved
    • Overview
    • SANS Community
    • CyberTalent
    • Work Study
    • Instructor Development
    • Sponsorship Opportunities
    • COINS
  • About
    • About SANS
    • Why SANS?
    • Instructors
    • Cybersecurity Innovation Awards
    • Contact
    • Frequently Asked Questions
    • Customer Reviews
    • Press Room
  • Log In
  • Join
  • Contact Us
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  1. Home >
  2. Blog >
  3. Women Influence in InfoSec Is on the Rise (and That's a Good Thing)
Deb Radcliff

Women Influence in InfoSec Is on the Rise (and That's a Good Thing)

June 13, 2019

If ever there was a year for women in InfoSec, it is 2019.

In May 2019 , when 125 women in IT security took their message to Washington during the third annual event coordinated by the EWF (Executive Women's Forum on Information Security, Risk Management & Privacy), I got to thinking: What influence do women truly have in InfoSec, and how does that influence impact the decision-making and policy-making processes?

Turns out, females have growing influence in InfoSec, which is leading to more balanced decisions and policies. This is the overall takeaway based on my recent interviews with Joyce Brocaglia (founder of EWF and organizer of the Washington event), Chenxi Wang (general partner of Rain Capital) and Diana Kelley (Microsoft Cybersecurity Field CTO).

"We aim to increase women's participation in the legislative process. It is really important that, at the inception of making those policies, we have the insights and influence of people that represent those who are going to be affected by those policies," says Brocaglia, who is also CEO of executive search firm Alta Associates.

At the two-day women's event, EWF delegates presented on cybersecurity education, diversity and female veterans in IT sec workforce. They also met with members of Congress, and answered questions from staff members representing Chuck Schumer (D-Senate Minority Leader) and Mitch McConnell (R-Senate Majority Leader) about 5G, privacy, and election security and integrity.

Numbers on the Rise

The number of women working at all levels of the cybersecurity workforce is rising. According to the most recent statistics from Cybersecurity Ventures, for example, women will represent more than 20% of the global cybersecurity workforce by the end of this year (2019), up from 11% in 2013.

That means, by virtue of their increase in numbers, female influence in ITsec is growing.

Listen, Learn, Educate

As a consensus, the three women interviewed for this blog all reported that their ability to listen, learn and then educate are key components to their success in influencing decisions and policies in InfoSec.

"If I were to hazard a guess, I'd say that on average, women tend to listen better," says Wang, who also serves on the board of MDU Resources Group, a publicly traded company listed on the NYSE. "Then we tend to digest the information and look at the issue horizontally: What else does this impact and how? That gives us a more macro view where we can help with broader issues, not just solve a specific problem."

Whether these traits lead to being a better influencer or not, Wang adds, is a matter of perspective. But most organizations and government agencies should see value in inclusiveness of different ways of looking at problems (aka diversity), according to all three women interviewed.

In Kelley's long and distinguished career, for example, she led a team of developers working on a new security solution. As a consultant, she built out security architectures for financial institutions entering the online banking space. Kelley has also worked as an industry analyst and developed security research publications, and now conducts CTO-level outreach for Microsoft. (These are just a few of the highlights.)

"I'm proudest when I can really listen and match the organizational and business needs to the security needs of my clients," Kelley says. "So, before you roll out a new program, make sure you have buy-in. That means educating the users as to why they need this important function and involving them in the decision-making and testing processes."

Listening, learning and educating are also facilitated through industry groups like the EWF. SANS, too, hosts specific Women's CONNECT receptions and training at its national events, and has a women's immersion academy. The Diana Initiative (not affiliated with Diana Kelley) started in the summer of 2015 during DEF CON 23 as a women's chat and now has a large number of highly qualified female speakers presenting at its 2019 event in Vegas.

Moving Up to the Boardroom

EWF's Brocaglia just launched a new company, BoardSuited, an e-learning program open to all genders, in order to increase diversity in the boardroom by helping professionals gain their first board seat.

"Boards are now looking to include more diverse 'digital directors,' who are tech-savvy," she says. "So, the time is now for female cyber professionals to best prepare and position themselves for board service."

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Join the SANS Community to receive the latest curated cybersecurity news, vulnerabilities, and mitigations, training opportunities, plus our webcast schedule.
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe

Tags:
  • Cybersecurity Insights

Related Content

Blog
Tech_Tuesday_Workshop_v2.jpg
Cybersecurity Insights
February 17, 2021
Experience SANS Live Online with Tech Tuesday Workshops
SANS is launching a new series of free Live Online Workshops, held every other Tuesday at 1:00pm ET.
SANS Institute
read more
Blog
Newsbites.jpg
Cybersecurity Insights
February 16, 2021
NewsBites Drilldown for the Week Ending 12 February 2021
John Pescatore - SANS Director of Emerging Security Trends Rogue IT has seen the benefit of using the cloud, too! This week’s Drilldown will focus on an item (included below) from NewsBites Issue 12, reporting that three small web hosting companies were compromised and one (No Support Linux...
370x370_john-pescatore.jpg
John Pescatore
read more
Blog
Newsbites.jpg
Cybersecurity Insights
February 9, 2021
NewsBites Drilldown for the Week Ending 5 February 2021
John Pescatore - SANS Director of Emerging Security Trends Patches are like vaccines: Low quality leads to long-lasting resistance and self-inflicted wounds. This week's Drilldown will focus on an item (included below) from NewsBites Issue 10, where a Google security researcher reported that 30%...
370x370_john-pescatore.jpg
John Pescatore
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters
  • The Critical Security Controls
  • Focus Areas
  • Blue Team Operations
  • Cloud Security
  • Cybersecurity Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Join the SANS Community to receive the latest curated cybersecurity news, vulnerabilities, and mitigations, training opportunities, plus our webcast schedule.
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe
  • © 2021 SANS™ Institute
  • Privacy Policy
  • Contact
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn