If you take a historical look at security, there is a perception that industry professionals are predominantly male and ex-military. One could assume that this view is but one barrier to overcome in achieving gender equality in security. Further suggesting that this view persists, statistics from Frost & Sullivan’s most recent “Women in Security” study showed that women represent only 10 percent of the security workforce.

“From a woman’s perspective, we do face a list of challenges, and we don’t always talk about them,” said Carmina Lees, vice president of the Security Business Unit at IBM UKI.

There is more we need to do to get the gender balance right in the security space, but are we boiling the ocean by talking about it like it’s a problem?

It’s time for women in security to challenge themselves and use their skills to their advantage. Without stereotyping too much, women tend to be naturally stronger than men in certain areas. We have an innate tendency to collaborate and network — attributes that help to gain trust and connect the dots across an organization. On paper, women are also more loyal and tend to change employers much less frequently than men.

Breaking Barriers

Promotion and pay can be topical and sensitive, especially if there are life factors hindering the likelihood of excelling in a career. Recent research from the Institute of Fiscal Studies found that women earn 18 percent less per hour than men on average, and the gap increases considerably after women have children.

This comes back to organizations recognizing the importance of work-life balance and how a new milestone in somebody’s personal life, whether male or female, does not necessarily impact their career performance.

“I’ve always tried to stay true to my values by being a mum, having a career and being myself,” said Carmina Lees.

The barriers to achieving gender equality may already be coming down as women become more comfortable being themselves both inside and outside of work.

The Rising Influence of Women in Security

The statistics suggest that there is still a shortage of women in security. Let’s take a different angle by looking at the impact of influencers in the industry.

Women Win the War

Women’s influence in security dates as far back as World War II. About three-quarters of the workforce at Bletchley Park was female, and many women had important roles, such as codebreaking. Although few women received the same level of recognition as their male peers, the collective success of the group at Bletchley Park led to a breakthrough in national security and, ultimately, the birth of the information age.

Shifting the Paradigm

It’s important that those working in the industry aren’t automatically branded as technical; there are numerous examples of successful women in business roles leading companies or departments. The IBM UKI Security Business Unit is a great example of strong female representation across various functional areas, particularly in the leadership team.

It is not limited to just one team, however. “There are so many inspiring leaders at IBM, many of them female,” said Wendi Whitmore, director of IBM X-Force Incident Response and Intel Services. “In the typically less diverse security industry, it is great to see IBM successfully shifting that paradigm.”

Working Together

Women have made apparent gains in the industry, but none of this success would have been attainable without the support of our male counterparts. We must pursue the goal of equality together, accepting organizational change.

There is no doubt that the barriers to gender equality in the workplace are changing as employers increase their focus on cultivating people. Balance can only be built if the people in leadership positions want it and understand the benefits of gender neutrality.

To raise the profile of women in security, we must move away from initiatives focusing specifically on women and recognize both male and female styles.

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…