March is Women’s History Month, so it’s a perfect time of the year to look back and see how far women in cybersecurity have come. From pioneering tech to achieving a gender-equal future in today’s world, it’s a story of invention, strength and achievement.

A Brief History of Women in Cybersecurity

If you asked someone in the 1800s or earlier, few would have guessed we would have a world where women and men are allies in each and every field. Today, we see women making major tech advances and men extending full support wherever required.

The stepping stones for women in cybersecurity date back to the 1940s, when the computer industry was still in its nascent stage. Brave women called code girls cracked German and Japanese codes to help win World War II. It all started when letters appeared in the mailboxes of a select group of young women attending the Seven Sisters colleges. Chosen for their aptitude in subjects as math, English, history and foreign languages, these students were invited from various fields and offered to join the secretive wartime government project.

Code breaker Virginia D. Aderholt became the first American to learn that World War II had formally ended in 1945. She was one of 10,000 women who were the foremothers of who we now call women in cybersecurity. They worked behind the scenes of wartime intelligence.

Many women were among the first programmers who worked on the Electronic Numerical Integrator and Computer program at the University of Pennsylvania, calculating weapons trajectories in the 1940s. These women have led us all with their courage and grit and cleared the path for all of us. Since then, we have continued to conquer.

Women in Cybersecurity Today

We have overcome obstacles and achieved amazing successes today. When people see us succeed, they only see the glorious achievement and recognition that today’s women have. But what people fail to see is the hard work, persistence, sacrifice, failure and loss overcome throughout history.

Today, women comprise 24% of the cybersecurity workforce. They act as leaders in all fields, being role models and setting great examples in the workplace. All of this would not have been possible without the support and open doors that today’s women have received from their male counterparts.

Groups and Missions

That said, there is still a long way to go. An estimated $100 billion is lost every year in the U.S. alone, and roughly 508,000 jobs in the U.S. are lost every year due to cyber crime. With a global economic impact of $600 billion, cybersecurity is in dire need of more workers. On top of that, an increase in working from home has boosted the demand for protection for personal devices. The increase in the demand for flexible and agile online working spaces has opened a door to new potential security threats.

A number of groups and projects are already in place for boosting cyber awareness, gender diversity and equality. Women in Security Excelling, Women in Cybersecurity, Women’s Society of Cyberjutsu, InfosecGirls, Women in Technology, AnitaB.org and OWASP Women in AppSec are leading the field. These organizations have been working hard and passionately so that women in cybersecurity can freely share their wisdom with the world. They have provided much-needed impetus for women in cybersecurity to outperform and exceed in the mission of making a secure world. Programs are held globally to increase awareness among the younger generations — CyberDay4Girls program, CyberWeekforFamilies and WICYS Student Chapter, to name a few.

Why Having More Diversity Matters

Our industry is still in need of a large and diverse workforce. We need experts more than ever to educate people. After all, that knowledge is the key to making our world secure.

But no matter how secure a system is built, there is always one weak link: humans. We’re easy prey for threat actors. It takes only one mistake to cause a breach that could be disastrous.

The answer to safer computing is having a diverse workforce. Diversity brings different perspectives and fresh outlooks to the table, which can change the status quo. It’s time to train and educate a diverse workforce that is gender-neutral and promises equal chances for all.

Women in cybersecurity need to support each other — sharing our thoughts, personalizing our brands, championing ourselves, connecting to colleagues, having wider reach and encouraging fellow women in cybersecurity to aim for bigger targets. From there, we can help keep the whole field safer.

More from CISO

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen.Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper risk…

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization's defenses against cyberattacks. However, while many organizations don't question the value of a CISO, there should be more debate over who this important role…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…