Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireCybersecurity News

Women Represent 24 Percent of Cybersecurity Workforce, (ISC)² Reports

women
April 2, 2019

(ISC)² released its 2019 Women in Cybersecurity report, which reveals that women now represent 24 percent of the cybersecurity workforce. While the stronger representation of women in the cybersecurity workforce is encouraging, the report indicates that challenges like wage inequality remain. 

“The data confirms what we’ve been seeing for the past few years on the ground. More women are coming into the field of cybersecurity with post-graduate degrees and not only working in the trenches but also in the C-suite,” said (ISC)² CEO David Shearer, CISSP. “Women in high-level positions will foster more inclusion and inspire young women to join the industry, and there are certainly many exciting opportunities available for those seeking to inspire a safe and secure cyber world. Diversity only makes us stronger.” 

Signs of Progress

The newest generation of professional entrants into cybersecurity is decidedly more female than in the past. 45 percent of women surveyed are millennials, compared to just 33 percent of men. While just 24 percent of the industry is female today, this will change the face of the cybersecurity profession in the years to come. 

Women also bring higher levels of education to cybersecurity. More women (52 percent) in the survey hold a post-graduate degree than their male counterparts (44 percent). 

The report also found that although men still outnumber women in cybersecurity by about three to one overall, women in the field are advancing to leadership positions. According to survey respondents, higher percentages of women than men are attaining senior leadership and decision-making positions: 

  • Chief Technology Officer – seven percent of women vs. two percent of men
  •  Vice President of IT – nine percent of women vs. five percent of men 
  • IT Director – 18 percent of women vs. 14 percent of men
  • C-level/Executive – 28 percent of women vs. 19 percent of men 

“It’s an encouraging sign that more women are succeeding in cybersecurity and moving up through the ranks,” said Jennifer Minella, CISSP, vice president of engineering & security at Carolina Advanced Digital, Inc. and chairperson of the (ISC)2 Board of Directors. “For many years this hasn’t been the case, and we need to continue to do all we can to make ours a welcoming profession for the most talented and innovative individuals, regardless of gender.”

Challenges Remain

While there is evidence of progress as more women enter into and succeed in the field of cybersecurity, the report also indicates that pay inequities persist. 17 percent of women globally reported annual salaries between $50,000 – $90,000, as compared to 29 percent of men and 15 percent of women earn between $100,000 – $499,999, while 20 percent of men earn at least that much. 

For all their differences, the report indicates that men and women share a lot of the same concerns about their roles, including lack of commitment from upper management, the reputation of their organization, risk of seeing their job outsourced, lack of work/life balance, the threat of artificial intelligence (AI) reducing the need for cybersecurity workers and a lack of standardized cybersecurity terminology to effectively communicate within their organizations.

KEYWORDS: cybersecurity pay gap women in cyber security workforce

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Hoodie Image for Cybersecurity

    (ISC)² survey shows women increasingly embracing cybersecurity as a career path

    See More
  • security certification-assurance-freepik

    Department of Defense approves additional (ISC)² certifications as requirements for cybersecurity staff

    See More
  • Female CEO

    22 Percent of Replacement CEOs are Women, Up from 18 Percent in 2017

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing