{"id":27810,"date":"2022-09-01T12:24:50","date_gmt":"2022-09-01T16:24:50","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=500901"},"modified":"2022-09-02T10:04:00","modified_gmt":"2022-09-02T14:04:00","slug":"international-women-in-cyber-day-advice-just-say-yes","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/international-women-in-cyber-day-advice-just-say-yes\/","title":{"rendered":"International Women in Cyber Day advice: Just say \u2018yes\u2019"},"content":{"rendered":"<p data-ar-index=\"0\">Not long after the pandemic began, Leigh Tynan was asked by a manager to move from her position as Telus\u2019 director of business strategy development to a new post: Leading the team developing <a href=\"https:\/\/www.telus.com\/en\/online-security?&amp;cmp=KNC_TELUS_HS_Search_AW_Brand_TOS_National_Exact_7730_SN_4246&amp;SEM_CID=16586431107&amp;SEM_AG=138186299001&amp;SEM_KW=telus%20online%20security&amp;SEM_MT=e&amp;gclid=Cj0KCQjwjbyYBhCdARIsAArC6LK8nvhyzcWEGGWVEgZPYgvuwDNK1EK0Haw1MFc3b-sVOx3u0oillGUaAjd1EALw_wcB&amp;gclsrc=aw.ds\" rel=\"noopener\">Telus Online Security<\/a>, a software-as-a-service offering to consumers for protecting their internet-connected devices.<\/p>\n<p data-ar-index=\"1\">She said yes.<\/p>\n<p data-ar-index=\"2\">That three-letter word is important for women who want careers in IT \u2014 and especially cybersecuity \u2014 a number of women emphasized in interviews for <a href=\"https:\/\/womenincyberday.com\/\">International Women in Cyber Day<\/a>, which is observed on September 1st.<\/p>\n<p data-ar-index=\"3\">\u201cThe answer is never, \u2018No,\u2019 when you get those taps on the shoulder,\u201d Tynan said. Don\u2019t turn down opportunities, she and other women said.<\/p>\n<p data-ar-index=\"4\">\u201cJust put your hand up,\u201d said Cheryl McGrath, country general manager and area vice-president of <a href=\"https:\/\/www.optiv.com\/solutions\/canada-operations\" rel=\"noopener\">Optiv Canada<\/a>, a major cybersecurity integrator. \u201cAsk for roles. Work hard once you get them. Don\u2019t shy away.\u201d<\/p>\n<p data-ar-index=\"5\">\u201cWe\u2019ll get there,\u201d she said of overcoming the male domination of the profession. \u201cIt\u2019s way better now than when I started doing this. And a lot of men are supporting women to move into careers in cyber. That\u2019s a positive change.\u201d<\/p>\n<p data-ar-index=\"6\">Women in Cyber Day, recognized in a number of countries and Canadian provinces, celebrates the work of women in the field, encourages young women to consider cybersecuity careers and pushes organizations to find ways to expand the number of women on their cyber teams.<\/p>\n<p data-ar-index=\"7\">In Canada, it will also be observed on September 20th <a href=\"https:\/\/womenincyberday.com\/events\/iwcd-symposium-2022\/\" rel=\"noopener\">with a day-long symposium with the theme of \u2018Education, Safety, and Security of Women and Girls.\u2019<\/a><\/p>\n<p data-ar-index=\"8\">Today is also a day to bring awareness of the challenges women face in this overwhelmingly male profession.<\/p>\n<p data-ar-index=\"9\">In Canada, it has been estimated that women make up only 10 per cent of the cybersecurity workforce, says Tynan. By comparison, <a href=\"https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2019\/04\/02\/ISC2-Research-Finds-Women-Comprise-24-percent-of-Global-Cybersecurity-Workforce\" rel=\"noopener\">ISC2 estimated in 2019 that women made up 24 per cent of the global cybersecurity workforce<\/a>. Cybersecurity Ventures <a href=\"https:\/\/cybersecurityventures.com\/women-in-cybersecurity\/\" rel=\"noopener\">predicts<\/a> women will represent 30 percent of the global cybersecurity workforce by 2025, and that will reach 35 percent by 2031.<\/p>\n<p data-ar-index=\"10\">Part of the problem is that cybersecurity \u2014 and IT in general \u2014 is seen as a profession requiring technical skills and certifications. Not necessarily, say the women we spoke to. There are many opportunities to learn on the job.<\/p>\n<h4 data-ar-index=\"11\"><a href=\"https:\/\/www.itworldcanada.com\/article\/dont-accept-no-women-who-want-careers-in-cybersecurity-can-get-it-says-juniper-networks-exec\/428360\" rel=\"noopener\"><strong>Related content: Don\u2019t take no for an answer<\/strong><\/a><\/h4>\n<p data-ar-index=\"12\">McGrath got a degree in political science and economics, but after joining Xerox Canada, learned IT and rose to become vice president of sales and client operations, including overseeing the 1,200-person delivery arm of the company\u2019s data centre outsourcing division.<\/p>\n<p data-ar-index=\"13\">Tyan says when she began running Telus Online Security she realized how little she know about cybersecurity. So she learned.<\/p>\n<p data-ar-index=\"14\">Ashley Mataya, senior manager of cyber partnerships at Vancouver-based <a href=\"https:\/\/www.lighthouselabs.ca\/\" rel=\"noopener\">Lighthouse Labs<\/a>, which offers many IT training courses, noted a number of Canadian universities \u2014 and Lighthouse \u2014 offer short cybersecurity bootcamps that women with little or no tech background can take for entry-level skills. Organizations should also encourage staff to take these courses so they can recruit cybersecurity talent in-house, she added.<\/p>\n<p data-ar-index=\"15\">Still, there can be obstacles.<\/p>\n<p data-ar-index=\"16\">\u201cWhen I started in cybersecurity, I thought I would gain respect and recognition by working hard, being a good team player, and producing excellent results,\u201d Sonali Shah, chief security strategist at Texas-based<a href=\"https:\/\/www.invicti.com\/\" rel=\"noopener\"> Invicti Security<\/a>, said in an email. \u201cUnfortunately, this was far from reality. I worked in establishments where male employers and board members have treated me differently from my male peers, sometimes consciously, and other times not, but never to my benefit. I was often the only female in the room, whether I worked in investment banking or a technology company.<\/p>\n<p data-ar-index=\"17\">\u201cThe most significant challenge for women in this space is they often don\u2019t see other women in technical, high-power roles within organizations. Sure, you can apply for an entry-level position and work your way up, but the real challenge is often entering the organization at the managerial or director level,\u201d she wrote.<\/p>\n<p data-ar-index=\"18\">That hasn\u2019t stopped her. Over a 25-year career Shah has been a technology executive, investor, and advisor at numerous security firms. She\u2019s helped launch startups, take high-growth companies into new markets and regions, and build and lead high-performing product and marketing teams.<\/p>\n<p data-ar-index=\"19\">There are arguable three tracks to getting more women into cybersecurity: Things the education system can do, things women can do in their careers, and things managers can do.<\/p>\n<p data-ar-index=\"20\">School boards should bring IT into middle- or even primary-school curriculums early, say many experts. McGrath notes many educators talk about STEM programs \u2014 science technology, engineering and math. She likes to talk about STEAM \u2014 adding A for arts. Why? Because, she argues, many girls shy away from STEM-related courses thinking they are too technical for them. A wide background can be an advantage for getting into IT, she said \u2014 an argument made by many of the women we interviewed.<\/p>\n<p data-ar-index=\"21\">McGrath said she\u2019s \u201cquite pleased\u201d\u00a0<a href=\"https:\/\/toronto.ctvnews.ca\/ontario-unveils-modernized-science-curriculum-will-begin-teaching-coding-in-grade-1-1.581017\" rel=\"noopener\">that Ontario is adding computer coding as early Grade 1.<\/a><\/p>\n<p data-ar-index=\"22\">There are a number of cybersecurity-related jobs that don\u2019t involve technology, the women we spoke to emphasized. These include writing manuals, proposals and marketing material, pitching customers on the ways a company\u2019s products can solve an organization\u2019s products, legal work, and more.<\/p>\n<p data-ar-index=\"23\">Women thinking about a career in cybersecurity \u2014 either because they are in university, in IT or want to shift from an existing job to cybersecurity \u2014 need to do several things:<\/p>\n<p data-ar-index=\"24\">\u2014 <strong>join an association<\/strong> that represents women in cybersecurity. There\u2019s no shortage of them. A short list includes Canada\u2019s <a href=\"https:\/\/womencybersecuritysociety.org\/\" rel=\"noopener\">Women in CyberSecurity Society<\/a>, <a href=\"https:\/\/www.wicys.org\/\" rel=\"noopener\">Women in Cybersecurity<\/a> (WiCyS) and the <a href=\"https:\/\/www.womsa.org\/\" rel=\"noopener\">Women\u2019s Security Alliance<\/a> (WOMSA). Groups like ISC2 have women\u2019s programs and a <a href=\"https:\/\/blog.isc2.org\/isc2_blog\/2022\/03\/celebrating-young-women-in-cybersecurity-weijia-yan-.html\" rel=\"noopener\">women\u2019s scholarship program.<\/a><\/p>\n<p data-ar-index=\"25\">There\u2019s a <a href=\"https:\/\/cybersecurityventures.com\/list-of-women-in-cybersecurity-associations-in-the-u-s-and-internationally\/\">longer list here<\/a> that includes Twitter and LinkedIn groups.<\/p>\n<p data-ar-index=\"26\">\u2014 <strong>take chances<\/strong>. \u201cIt\u2019s a fast and furious world where women can excel,\u201d McGrath said she tells women. \u201cThey just need to seize the opportunities \u2014 and ask for them. And be willing to learn. It is hard work. It changes more rapidly than any other IT role I\u2019ve had because we have to try to stay one step ahead of the nation-state actors and bad guys.\u201d<\/p>\n<p data-ar-index=\"27\">\u2014 <strong>speak up<\/strong>. \u201cOne of the biggest things is trusting your voice and speaking up,\u201d said Tynan. \u201cSo often you think somebody else knows more than you do. But that\u2019s not true. I have learned in my career to speak up and have a voice.\u201d<\/p>\n<p data-ar-index=\"28\">\u2014 <strong>take control<\/strong>. \u201cYou have to own your career,\u201d she added. \u201cIf you\u2019re waiting for someone to do it for you, to tag along [with them], you might be lucky. But you also need to invest in your network, invest in areas you find interesting and learn more. If you\u2019re waiting for something to happen, it may not. No one can control your career except you.\u201d<\/p>\n<p data-ar-index=\"29\">As for organizations, the women we spoke to said leaders have to create and get behind diversity programs for all departments, including the IT and security teams.<\/p>\n<p data-ar-index=\"30\">One way, Shah said, is to build security champion programs for pulling talent from other areas of the organization. \u201cThe great thing about security champion programs is how they\u2019ve evolved in recent years to include employees who aren\u2019t necessarily experts and expand to those with a security interest,\u201d she wrote. \u201cThese individuals help champion the security message wherever they are in your organization and can help ensure greater buy-in from the larger company, generate feedback and gain insight from people of different backgrounds and focus areas. Especially with the talent shortage in cybersecurity, this kind of program allows companies to bring in new skills and perspectives that can trickle throughout the organization and help educate and create awareness and interest in the cybersecurity function of the business.\u201d<\/p>\n<p data-ar-index=\"31\">Telus, for example, has an internal program called \u201cConnections\u201d which focuses on driving gender equality, and providing networking and career development opportunities for women and those who identify as women. Tynan is part of the company\u2019s global team.<\/p>\n<p data-ar-index=\"32\">Training new hires or upskilling staff doesn\u2019t have to be expensive, <a href=\"https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2022\/06\/16\/ISC2-Research-Finds-Employer-Hiring-Practices-Must-Evolve-to-Overcome-the-Workforce-Gap\" rel=\"noopener\">says a recent study by the ISC2.<\/a><\/p>\n<p data-ar-index=\"33\">Forty-two per cent of cybersecurity hiring managers recently surveyed said training costs less than US$1,000 for entry-level hires (those with less than one year of experience) to handle assignments independently.<\/p>\n<p data-ar-index=\"34\">Nearly a third (30 per cent) of respondents said it takes less than US$1,000 in training costs for junior-level practitioners (one to three years of experience) to handle assignments independently.<\/p>\n<p data-ar-index=\"35\">HR leaders also have to change job descriptions to get a wider range of applicants, said Mataya. Usually they are written with what she called a male-centric viewpoint. In part that\u2019s because men are more likely to apply for a job even if they don\u2019t meet all the published requirements. Many women, however, will only apply if they meet all of a job\u2019s published requirements. \u201cIt\u2019s not for lack of confidence, but more for \u2018I don\u2019t want to waste anyone\u2019s time.&#8217;\u201d she said.<\/p>\n<p data-ar-index=\"36\">So HR needs to work with managers to make their list of job requirements less specific, particularly if some skills can be taught on the job.<\/p>\n<p data-ar-index=\"37\">\u201cThere are currently 3,700 open vacancies for cybersecurity positions in Canada,\u201d said Mataya. \u201cWhat companies need to do is figure out where that talent is coming from. There is an entire population of people who have not been looked at as a perfect pool of talent to draw from when it comes to roles in tech, especially in cybersecurity.\u201d<\/p>\n<p data-ar-index=\"38\">There are \u201cmassive opportunities\u201d in cybersecurity, said Tynan, \u201cand I hope women and girls around the world take the time to learn more about cybersecurity and get interested in it, because no matter what your skill set there is room. We need diversity of thought and experience to help combat the cyber risks we face. Everyone is welcome.\u201d<\/p>\n<p data-ar-index=\"39\">Stephanie Benoit-Kurtz, principal security consultant at Trace3, a U.S. consultancy with offices in 11 states, who is also and lead cybersecurity faculty for the college of business and information technology, University of Phoenix, said cybersecurity is \u201creally is an amazing career \u2026 It\u2019s never the same job two days in a row, there\u2019s always something different \u2026 Every day you get to be involved in cutting edge technology that can transform the way the business works.<\/p>\n<p data-ar-index=\"40\">\u201cMy advice to every woman in technology is to make sure you take your seat at the table,\u201d she added.\u00a0\u201cDon\u2019t sit on the sidelines, don\u2019t sit in the chair next to the wall. Let your opinions and your experience be heard.\u201d<\/p>\n<p data-ar-index=\"41\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/international-women-in-cyber-day-advice-just-say-yes\/500901\">International Women in Cyber Day advice: Just say \u2018yes\u2019<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t turn down opportunities say experts we talked to about how women can advance their careers in cyb<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[18,16,30],"tags":[391,651,396,393,275],"class_list":["post-27810","post","type-post","status-publish","format-standard","hentry","category-careers-education","category-security","category-women-in-tech","tag-di","tag-international-women-in-cyber-day","tag-postmedia","tag-security-strategies","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/27810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=27810"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/27810\/revisions"}],"predecessor-version":[{"id":27857,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/27810\/revisions\/27857"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=27810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=27810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=27810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}