Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Tactics ColumnSecurity Leadership and ManagementSecurity Education & Training

Cyber Tactics

In pursuit of diversity

By John McClurg
SEC1120-Cyber-Feat-slide1_900px
SEC1120-cyber-slide2_900px
SEC1120-Cyber-Feat-slide1_900px
SEC1120-cyber-slide2_900px
November 1, 2020

Last month, in this column, we advanced a discussion of the hermeneutics involved in the interpretations we make daily and of our growing propensity to commit Group Attribution Error. While the mistaken preconceptions that produce that error are indeed what I believe to be the most pervasive and potentially consequential risks that we face today, I would add the following important qualification:  The risk is not just that of mistakenly holding a preconception toward another person.  The risk is one of unconsciously holding such preconceptions. Preconceptions in humans are unavoidable. None of us arrives here outside a context of some sort. There is no such thing as a “blank slate.” The interpretive act always establishes itself on preconceptions, presuppositions or assumptions of one sort or another.

The greater risk, I fear — even more insidious because of the quiet way in which it also creeps in upon us — is that of having stereotyped in a way that is not consistent with what rightly conceived diversity training gains for us; training that brings us to the point of appreciating that even within what might be perceived as the same culture or ethnicity, there are differences between individuals that make them exquisitely unique. No two individuals have the exact background.  Not even twins (and I am one) — with all the similarities of culture, education and background — approach the world in the same way. Each has a different life history.  It’s within that historicity that we advance our interpretations.

To suggest that to understand the complexities of diversity and derive its benefits, we need to focus on traditionally accepted delineations of culture and ethnic groupings, potentially taints our communities in ways that I believe we want to avoid. Gross generalizations or similarities that we impute to a group are abstractions more reflective of the cognitive limitations of our own mental powers of observation than reflective of any real or enduring states or conditions.

After ten hours of graduate-level statistics, the only principle that has stuck with me through the decades was that there “is more measurable variability within a randomly generated sample cell than that which is measurable between randomly generated sample cells.” As a fraternal twin, I may have acquired a sense of that principle sooner than most. I had blue eyes, my twin had green; I was tall, he was short; and the distinctions only grew more pronounced through the years.  But in the eyes of most diversity programs we were the same — we were caucasians or as Webster defines: of or pertaining to the white race as defined by law; specified as composed of persons of European, North African or Southwest Asian ancestry. White is called out as — free from color; the color of new snow (although Eskimos are said to make more than 30 distinctions of how snow varies), not black, brown, yellow or red.
At this point, consider again the statistical axiom that there is greater variability or difference within a measurable sub-grouping than between sub-groupings – greater variability within Whites, Blacks, Latins, Asians or Natives than between any of those groups. That 36 countries make up what is known as European, 10 North African, and 2 Southwest Asian accounts for how that is true. The diversity resident within those countries was sufficiently pronounced as to be that upon which countless conflicts, including two World Wars, were launched.

Consider the sources of cultural variability that contribute to that diversity: CUSTOMS & COURTESIES – greetings, treatment of visitors, eating, gestures; PEOPLE – general attitudes, personal appearances, population (constitution), language, religion; LIFESTYLE – family, dating and marriage, diet, business, recreation, holidays; NATION – land and climate, history, economy, education, politics, and health.

This discussion is particularly relevant as we in the cybersecurity community seek to address the “talent gap” that currently assails us. Clearly as we seek to fill those ranks, there are past discriminatory acts that need to be redressed, but that remedial effort shouldn’t be confused with that of achieving diversity…the attainment of which is almost unavoidable if each individual is properly considered. Examining that talent gap and efforts to manage it will be a topic I take up next month.

KEYWORDS: Facebook security GDPR personally identifiable information privacy concerns

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Cyber

    Have we declared “open season” on CISOs?

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Security of Information and Communication Networks

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing