{"id":44370,"date":"2017-09-28T18:00:43","date_gmt":"2017-09-29T01:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=44370"},"modified":"2020-04-21T14:35:38","modified_gmt":"2020-04-21T21:35:38","slug":"cybersecurity-canon-candidate-book-review-women-cybersecurity","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/09\/cybersecurity-canon-candidate-book-review-women-cybersecurity\/","title":{"rendered":"The Cybersecurity Canon: Women in Cybersecurity"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p><em>We modeled the\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><em>Cybersecurity Canon<\/em><\/a><em>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><em>directly participate in the process<\/em><\/a><em>. Please do so!<\/em><\/p>\n<h2><strong>Executive Summary<\/strong><\/h2>\n<p>\u201cWomen in Cybersecurity,\u201d by Jane LeClair and Denise Pheils, is an excellent candidate for the Cybersecurity Canon. The ongoing cybersecurity skills shortage has been discussed for years now. In the United States, <a href=\"https:\/\/www.forbes.com\/sites\/jeffkauflin\/2017\/03\/16\/the-fast-growing-job-with-a-huge-skills-gap-cyber-security\/#206ff7d55163\" rel=\"nofollow,noopener\" >employers find it difficult to hire 200,000 cybersecurity professionals every year<\/a>, and surprisingly, <a href=\"https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/03\/WomensReport.pdf\" rel=\"nofollow,noopener\" >merely 11 percent of the information security workforce is women<\/a>.<\/p>\n<p>In this book, the authors untangle some of the key problems that prevent women from joining the field from gender, sociocultural and career perspectives. While conferences and organizations like the Grace Hopper Celebration of Women in Computing or the Women\u2019s Society of Cyberjutsu have been trying to bring diversity to cybersecurity, we have not come across many books that discuss the paucity of female cybersecurity professionals and what can be done to address this. Out of more than 2,100 English-language books available on Amazon on July 2017, I have only been able to find a few that cover this topic and its challenges.<\/p>\n<p>As information technology underpins critical infrastructure operations, daily lives, national security and social welfare, cybersecurity is becoming more important than ever to protect our way of life in the digital age. To some extent, we deal with IT and cybersecurity daily. It is our responsibility to create a circle of boosters for cybersecurity talents rather than nipping educational or career opportunities in the bud.<\/p>\n<p>I encourage all parents, employees, managers and those thinking of making the career switch to read this short book. It would be an hour well spent, and will hopefully help to start the change and move toward diversity in cybersecurity.<\/p>\n<h2><strong>Review<\/strong><\/h2>\n<p>I chose this book as a candidate for the Cybersecurity Canon because \u201cWomen in Cybersecurity,\u201d by Jane LeClair and Denise Pheils, is one of the few English books currently published that covers this important topic. As information technology underpins critical infrastructure operations, daily lives, national security and social welfare, cybersecurity is becoming more important than ever to protect our way of life in the digital age. Despite this, the shortage of cybersecurity professionals remains acute. Since IT is embedded in so many of our activities, cybersecurity requires the education, recruitment, and retention of diversified skillsets and professionals.<\/p>\n<p>We are in dire need of diversified expertise and insights. Everyone should read this book to understand the problems and solutions the authors describe. They should also start thinking about their own ways to aid the next-generation workforce pipeline, as on its own, the book does not offer all the answers to overcome this sociocultural bias.<\/p>\n<p>LeClair and Pheils wrote this book to analyze why women are underrepresented in cybersecurity and offer solutions to bring women into the field, as <a href=\"https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/03\/WomensReport.pdf\" rel=\"nofollow,noopener\" >women globally constitute only 11 percent of the cybersecurity workforce<\/a>. [1] In Chapters 2 through 4, LeClair and Pheils analyze sociocultural, educational and professional barriers that have discouraged women from obtaining cybersecurity jobs. In Chapter 5, they outline solutions to address these challenges, and in Chapter 6, strategies for \u201cBreaking the Glass Ceiling.\u201d Chapter 7, \u201cOn the Glass Cliff,\u201d describes a scenario where a woman fails to take advantage of a career opportunity in a company and has to start her career all over again at another organization. Finally, Chapter 8, \u201cImposter Syndrome and Women,\u201d describes how women can be affected by the inability to recognize their own accomplishments.<\/p>\n<p>Chapter 2, \u201cGirls in Predetermined Roles,\u201d points out, \u201cIT and cybersecurity careers have been classified as masculine because of the math-based discipline, the collective reference to gaming and hacking, and the fact that the industry is largely male-dominated.\u201d Cultural and familial gender biases and traditions morph girls into their expected role, and it is challenging for women to repel such pressure, especially when their families neither understand their desires nor provide financial or moral support for their career decisions.<\/p>\n<p>The authors share several examples of educational and networking opportunities for girls in Chapter 3, \u201cGirls in K-12.\u201d LeClair and Pheils emphasize the importance of educating girls about cybersecurity, STEM \u2013 science, technology, engineering and mathematics \u2013 and other career options as early as possible.<\/p>\n<p>Chapter 4, \u201cWomen in the Technology Workplace,\u201d provides a disturbing fact: <a href=\"http:\/\/www.computerworld.com\/article\/2551969\/it-careers\/it-careers-why-women-quit-technology.html\" rel=\"nofollow,noopener\" >more than half of women \u2013 52 percent \u2013 drop out of the tech field at between 35 and 40 years old<\/a>. [2] <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4279242\/\" rel=\"nofollow,noopener\" >Even as of 2013, the female attrition rate is higher in the STEM field (50 percent) than in non-STEM field (20 percent)<\/a>. [3] The authors attribute such high turnover to several factors, including long hours, family responsibilities, unequal pay, difficulties getting promoted, lack of mentors and diversity in the workplace, and sexual harassment.<\/p>\n<p>Next, Chapter 5, \u201cSolutions to Barriers,\u201d talks about how family, mentors and the workplace can solve those problems. LeClair and Pheils encourage parents to be more understanding of their daughters\u2019 educational or career choices, and even provide verbal or financial support. They also explain the need for teachers and guidance counselors to provide career, educational and life planning advice for female students. Role models and mentorship are crucial to help women see themselves in certain positions and overcome challenges on the way to their goals. Mentorship can come from women as well as men to help the next generation flourish and grow. These efforts will bring talent of either gender to different ranks of cybersecurity jobs, and equality will improve.<\/p>\n<p>As of 2017, <a href=\"http:\/\/www.catalyst.org\/knowledge\/women-ceos-sp-500\" rel=\"nofollow,noopener\" >women account for only 5.6 percent of CEO positions (23 female CEOs) at Standard &amp; Poor\u2019s 500 companies<\/a>. [4] The paucity of women is not just a problem in cybersecurity; it is prevalent across the industry, especially in senior positions. Chapter 6, \u201cBreaking the Glass Ceiling,\u201d offers specific tips for women to get to the higher ranks. Again, mentorship is key to help women develop strength and contribute to the business even more.<\/p>\n<p>The authors warn that women may face another daunting challenge even after they break the \u201cglass ceiling.\u201d Chapter 7, \u201cOn the Glass Cliff,\u201d gives a pessimistic scenario: a woman fails a high-profile project at which her predecessors never succeeded, and she has to \u201cleave the company and start again under a similar set of circumstances at a new company.\u201d In my opinion, this chapter fails to provide concrete advice on how to overcome \u201cthe glass cliff,\u201d beyond encouraging women not to give up their desires, and to maintain their integrity and the quality of their work. It would have been beneficial for employers and employees to understand what kinds of team-building and mentorship would help women in certain positions get their work done.<\/p>\n<p>Some women can relate to Chapter 8, \u201cImposter Syndrome and Women.\u201d The syndrome is explained thus: \u201cpeople who achieve success \u2013 especially women \u2013 often tend to reflect on their achievements and begin to doubt their own abilities\u201d due to their failure to internalize the success they have achieved through their abilities and aspirations. I have encountered and heard about accomplished women who tend to <a href=\"http:\/\/www.apa.org\/gradpsych\/2013\/11\/fraud.aspx\" rel=\"nofollow,noopener\" >believe their achievements merely come from luck<\/a>. [5] Since people around these women do not necessarily understand their inner struggles, they may find themselves distressed even more. As the authors emphasize, it is important to understand that even famous high achievers share this self-doubt and encourage women to take the next step by listing their achievements rather than diminishing themselves.<\/p>\n<p>Some statistics and facts in Chapters 6 through 8 may sound daunting to young women who are interested in STEM and cybersecurity careers. Remember, these numbers and data are presented to serve as food for thought. They are meant to help parents, teachers, employers and colleagues understand challenges women currently face as well as to prepare them to tackle potential problems they may encounter in the future.<\/p>\n<p>There remain unanswered questions about the sociocultural pressures outside of the United States. People from other countries may not necessarily be able to find specific examples relevant to themselves. Nonetheless, the information shows there are champions or partners with whom those people may want to team up outside their organization or country.<\/p>\n<p><a href=\"https:\/\/www.comptia.org\/about-us\/newsroom\/press-releases\/2016\/09\/20\/comptia-launches-new-campaign-to-inspire-girls-to-make-tech-her-story\" rel=\"nofollow,noopener\" >The Computing Technology Industry Association<\/a> points out that 69 percent of girls who have never considered an IT job do so only because they are unaware of opportunities available for them. [6] This is so wrong. While \u201cWomen in Cybersecurity\u201d focuses on the technical side of cybersecurity and does not discuss non-technical aspects, both men and women should be informed of career options equally.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>This book, \u201cWomen in Cybersecurity,\u201d is Canon-worthy because it will arm readers with ways to tackle diversity, psychological and talent shortage challenges. Your one-hour journey to read the book is the first step to overcome these things. Let\u2019s make history together to educate, recruit, retain, train, promote, and reward men and women who are keen to pursue cybersecurity careers. We need you.<\/p>\n<h2><strong>Sources<\/strong><\/h2>\n<p>[1] \u201cThe 2017 Global Information Security Workforce Study: Women in Cybersecurity,\u201d by Frost &amp; Sullivan, Alta Associates\u2019 Executive Women\u2019s Forum, Center for Cyber Safety and Education, and (ISC)<sup>2<\/sup>, 2017, <a href=\"https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/03\/WomensReport.pdf\" rel=\"nofollow,noopener\" >https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/03\/WomensReport.pdf<\/a>, 6.<\/p>\n<p>[2] \u201cWhy women quit technology,\u201d by Kathleen Melymuka, <em>Computerworld<\/em>, 16 June 2008, last visited 1 August 2017, <a href=\"http:\/\/www.computerworld.com\/article\/2551969\/it-careers\/it-careers-why-women-quit-technology.html\" rel=\"nofollow,noopener\" >http:\/\/www.computerworld.com\/article\/2551969\/it-careers\/it-careers-why-women-quit-technology.html<\/a>.<\/p>\n<p>[3] \u201cWhat\u2019s So Special about STEM? A Comparison of Women\u2019s Retention in STEM and Professional Occupations\u201d by Jennifer L. Glass, Sharon Sassler, Yael Levitte, and Katherine M. Michelmore, <em>National Center for Biotechnology Information<\/em>, 21 August 2013, last visited 2 September 2017, <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4279242\/\" rel=\"nofollow,noopener\" >https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4279242\/<\/a>.<\/p>\n<p>[3] \u201cWomen CEOs Of The S&amp;P 500,\u201d by <em>Catalyst<\/em>, 14 June 2017, last visited 1 August 2017, <a href=\"http:\/\/www.catalyst.org\/knowledge\/women-ceos-sp-500\" rel=\"nofollow,noopener\" >http:\/\/www.catalyst.org\/knowledge\/women-ceos-sp-500<\/a>.<\/p>\n<p>[4] \u201cFeel like a fraud?\u201d by Kirsten Weir, <em>American Psychological Association<\/em>, November 2011, last visited 3 August 2017, <a href=\"http:\/\/www.apa.org\/gradpsych\/2013\/11\/fraud.aspx\" rel=\"nofollow,noopener\" >http:\/\/www.apa.org\/gradpsych\/2013\/11\/fraud.aspx<\/a>.<\/p>\n<p>[5] \u201cPress Release: COMPTIA LAUNCHES NEW CAMPAIGN TO INSPIRE GIRLS TO \u201cMAKE TECH HER STORY\u201d,\u201d by Computing Technology Industry Assn., 20 September 2016, last visited 3 August 2017, <a href=\"https:\/\/www.comptia.org\/about-us\/newsroom\/press-releases\/2016\/09\/20\/comptia-launches-new-campaign-to-inspire-girls-to-make-tech-her-story\" rel=\"nofollow,noopener\" >https:\/\/www.comptia.org\/about-us\/newsroom\/press-releases\/2016\/09\/20\/comptia-launches-new-campaign-to-inspire-girls-to-make-tech-her-story<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read Mihoko Matsubara\u2019s review of \u201cWomen in Cybersecurity\u201d by Jane LeClair and Denise Pheils for the Cybersecurity Canon.<\/p>\n","protected":false},"author":189,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251,4270,4512,4515,4509,2097,3474,2922],"coauthors":[1920],"class_list":["post-44370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon","tag-cybersecurity-canon-review","tag-denise-pheils","tag-diversity","tag-jane-leclair","tag-mihoko-matsubara","tag-women-in-cybersecurity","tag-women-in-tech"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/44370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=44370"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/44370\/revisions"}],"predecessor-version":[{"id":44649,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/44370\/revisions\/44649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=44370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=44370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=44370"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=44370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}