* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [CSO Perspective](https://origin-researchcenter.paloaltonetworks.com/blog/category/cso-perspective/) * Chasing the Dream: Women ... # Chasing the Dream: Women in Cybersecurity Across Asia-Pacific and Beyond [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F12%2Fcso-chasing-dream-women-cybersecurity-across-asia-pacific-beyond%2F) [](https://twitter.com/share?text=Chasing+the+Dream%3A+Women+in+Cybersecurity+Across+Asia-Pacific+and+Beyond&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F12%2Fcso-chasing-dream-women-cybersecurity-across-asia-pacific-beyond%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F12%2Fcso-chasing-dream-women-cybersecurity-across-asia-pacific-beyond%2F&title=Chasing+the+Dream%3A+Women+in+Cybersecurity+Across+Asia-Pacific+and+Beyond&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2017/12/cso-chasing-dream-women-cybersecurity-across-asia-pacific-beyond/&ts=markdown) \[\](mailto:?subject=Chasing the Dream: Women in Cybersecurity Across Asia-Pacific and Beyond) Link copied By [Mihoko Matsubara](https://www.paloaltonetworks.com/blog/author/mihoko-matsubara/?ts=markdown "Posts by Mihoko Matsubara") Dec 13, 2017 7 minutes [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [Women in Cybersecurity](https://www.paloaltonetworks.com/blog/tag/women-in-cybersecurity/?ts=markdown) Since I joined Palo Alto Networks nearly two years ago, a dozen women -- from undergraduate students to mid-career professionals from different countries -- have asked for my advice on how to get a job in cybersecurity. They are all passionate about learning a new skill set, be it coding, policymaking or a foreign language. Their passion makes me smile and feel galvanized to help them and keep learning new aspects of cybersecurity. Interestingly, I do not have many female peers in this field and have not met many women at conferences or forums. I started to wonder why those aspiring cybersecurity professional candidates are not represented among the already low representation of women in this field. [Women comprise only 11 percent of the global cybersecurity workforce](https://iamcybersafe.org/news_women_cybersecurity/). The representation is even lower in Asia-Pacific (10 percent), where almost 0 percent of C-level positions and 1 percent of executive management roles are held by women. Questions I am repeatedly asked from aspiring candidates are, "I do not have a computer science degree. Can I get a job in cybersecurity?" and "I do not have any work experience in cybersecurity but I am very interested in it. Can I find a job?" My response to them is, "I studied Renaissance history in undergraduate school and I did not have 'cybersecurity' in my job title until five years ago. If you are passionate about cybersecurity, just go for it. You have identified some gaps you can bridge and new opportunities you can offer to the world." After completing my undergraduate degree in European History, I started my career in the Japanese Ministry of Defense, and later moved to the United States for a master's degree in International Relations and Economics. I also worked at a think tank in the U.S., as well as a Japanese and American IT company before joining Palo Alto Networks in 2016. I am not a typical cybersecurity professional. The beauty of the cybersecurity field is it allows people to connect the dots between disparate things. This could be between different cultures, organizations, sectors, and countries via technology, diplomacy, risk management, communications, policy, and cyberthreat intelligence. By connecting these disparate areas together, it enables us to prevent successful cyberattacks, protect our assets and values, and continue innovations. To tackle complex cyber risks, we need diversified skillsets such as communication skills to deal with difficult conversations. That is why it is crucial to have a diverse range of thought perspectives and skillsets at the table for stronger cybersecurity. Even though more and more women seem to be interested in a career in cybersecurity, the talent pipeline creation faces some challenges: lack of knowledge of available opportunities and retention. [The Computing Technology Industry Association, more commonly known as CompTIA](https://www.comptia.org/about-us/newsroom/press-releases/2016/09/20/comptia-launches-new-campaign-to-inspire-girls-to-make-tech-her-story), points out in a study that 69 percent of girls between the ages of 10 and 17 surveyed have never considered an IT job and attribute this to being unaware of the opportunities available to them. Furthermore, retention is another problem. More than half of women -- [52 percent](https://www.computerworld.com/article/2551969/it-careers/it-careers-why-women-quit-technology.html) -- drop out of the tech field between 35 and 40 years of age. Palo Alto Networks hosted two Women in Cyber Roundtable series in Canberra and Sydney in October to identify ways to bring more women to cybersecurity and provide an inside look at what career roles are in the field. Australia has started a couple of cybersecurity diversity projects. First, the Australian government has spearheaded efforts to encourage more women to pursue a career in cybersecurity. This can be seen in [Australia's Cyber Security Strategy](https://cybersecuritystrategy.pmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf) and the "[Celebrating #WomeninCyber](https://blog.dfat.gov.au/2017/03/08/celebrating-women-in-cyber/)" video blog launched by Tobias Feakin, Australian Ambassador for Cyber Affairs on the website of the Department of Foreign Affairs and Trade in March 2017. Second, the government established [the National Innovation and Science Agenda](https://www.innovation.gov.au/page/national-innovation-and-science-agenda-report) in 2015 to invest 13 million Australian dollars over five years to encourage young women to pursue STEM-related career. We were privileged to have Chris Cubbage, executive editor at Australian Security Magazine, moderate the two roundtable sessions. Both events had over ten special guests, from an intern to C-level executives. While most of the attendees were women, it was great to see that we had some male participants as well. Topics we covered included flexibility, culture, courage, and mentorship. Here are my findings: * When an organization has a solid representation of female talent in its workforce, its leadership team also successfully sends that corporate culture message to mid-management, which has direct impact on employees' way of work. The leadership also clearly designates decision-makers for the working environment. Those organizations are able to implement a policy to allow working parents or caregivers to work flexibly, e.g. job sharing. * Mentoring needs to have support from both leadership and mid-management to create a more rounded culture and workforce. It is important to have mentoring across the entire workforce and people can receive guidance from other team members who may have a different background or career experience. * It is important for job applicants to learn about the wide range of career opportunities for them in cybersecurity, both technical and non-technical. Some candidates struggle with finding the "right" job because they try to check all the boxes for requirements listed on a job description before applying for the job rather than also seeking what kind of new values they can bring to the potential employer. They may not necessarily know that backgrounds in risk management or journalism are applicable for roles in cybersecurity consulting or marketing. It is necessary to make the information on mapping of soft and technical skillsets and range of open cybersecurity roles widely available to those who seek cybersecurity careers. [The Security Job Profile Project](https://www.securityjobprofileproject.com/#home) and the [Australian Women in Security Network](https://www.auswomeninsecurity.net/) offers this background on various cybersecurity roles, as well as an opportunity to network with or mentor peers. * In career transition and retention, a sense of confidence and recognition is important to both employees and employers. Given how rapidly the cyberthreat landscape and technologies are evolving, it is important to be flexible and invest in employees' potential and provide guidance for skill stretching. Employees also need to be confident, courageous, and open to learning new skills or techniques. Given how rapidly cybersecurity is evolving, there is no one way to get into cybersecurity today and the same is true for the future. You have to pave your own way, which will be bumpy but which will bring you to new peers, mentors, perspectives, and technologies you would have never imagined. One of the ladies, to whom I have been talking for a while, recently started to take a coding class. She has no technical background but decided to stretch her skills and knowledge base. I shared one example to address the talent pipeline creation issue. In June 2017, Palo Alto Networks and Girl Scouts USA announced a collaboration to develop the first ever national cybersecurity badges for K-12 girls. The cybersecurity badge program will be available in the US and we are evaluating opportunities to roll out a global program at a later date. Engagements with K-12 girls means we will also talk to their parents, siblings, teachers, and community. We hope that they will be little cybersecurity ambassadors that will inspire their family and classmates. After the two Women in Cyber events in Australia, one of the participants sent me a message saying the roundtable made her more determined to pursue a role in cybersecurity. Another already started to send emails about whom to engage with to draw more talent to their business. These two roundtables are just the beginning of our new journey for thought diversity and women in cybersecurity in Asia-Pacific. I would welcome your stories and perspectives to share your journey, challenges, and successes and look forward to meeting you in our next events and hopefully as my colleagues in cybersecurity! **Want to learn more?** [Listen to our new Women in Cyber podcast series](https://www.paloaltonetworks.com/resources/podcasts/women-cyber-podcast) *** ** * ** *** ## Related Blogs ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) [#### Information Security Governance](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/information-security-governance/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [#### Interviewing Stephanie Hagopian --- Finding Your Place in Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/2023/04/interviewing-stephanie-hagopian/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Japan's New Cybersecurity Strategies Have the Right Priorities in Mind](https://origin-researchcenter.paloaltonetworks.com/blog/2017/11/cso-japans-new-cybersecurity-strategies-right-priorities-mind/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [#### Palo Alto Networks Day Japan 2017: Evolving Cybersecurity Efforts to Increase Trust in the Digital Age and Prevent Cyberattacks](https://origin-researchcenter.paloaltonetworks.com/blog/2017/09/cso-palo-alto-networks-day-japan-2017-evolving-cybersecurity-efforts-increase-trust-digital-age-prevent-cyberattacks/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Tips for Gamifying Your Cybersecurity Education and Awareness Programs](https://origin-researchcenter.paloaltonetworks.com/blog/2017/07/cso-winning-game-cybercriminals/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### A Seat at the Table: How Countries Like Japan Can Be More Visible in Cybersecurity Discussions](https://origin-researchcenter.paloaltonetworks.com/blog/2017/06/cso-a-seat-at-the-table-how-countries-like-japan-can-be-more-visible-in-cybersecurity-discussions/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language