Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEnterprise Services

How women can break the cybersecurity glass ceiling - And why we need to help them

By Ashley Rose
cyber security freepik

<a href='https://www.freepik.com/photos/background'>Background photo created by rawpixel.com - www.freepik.com</a>

April 7, 2021

A record number of women took the helm at Fortune 500 companies in 2020 helping to steer big brands like Clorox, Gap and UPS through the pandemic and one of the most volatile business climates in history. While companies have been under pressure for years to diversify, this trend also represents a shrewd business decision.

A 2019 S&P Global study found that public companies with women at the helm were more profitable compared to those with men in the CEO and CFO seats. Women are also making big inroads in other fields including science and medicine. Yet in the tech and cybersecurity industries women still lag behind. It’s certainly not because of a lack of jobs. Though the talent shortage did ease last year, the industry as a whole is struggling to fill vacancies. There are a few reasons that women aren’t filling those seats.

 

The hiring gap

Cybersecurity is still a male-dominated industry and this gender bias leads to a false perception that women don’t have a place. Last year’s Women in Cybersecurity report from (ISC)2 found that while younger women are pushing into the industry - nearly half of the female cybersecurity professionals surveyed were millennials - women still make up just 24% of the overall cyber workforce. This impacts who is included in meetings, who gets promoted into leadership roles, and ultimately the entire makeup of an organization’s culture.

A 2020 survey of 200 female cybersecurity professionals across the United States and the United Kingdom reported one of the barriers is a lack of other female role models. When women don’t see themselves at the table, the stereotype that tech jobs are “just for men” becomes a self-fulfilling prophecy. I’m proud to say that 50 percent of Living Security’s team is made up of women, something we think is important to build an inclusive culture that fosters female leadership. Companies that also want to make gender diversity a core value need to start with the hiring process and devote extra time and resources to finding diverse candidates.

 

Pay inequity

The gender pay gap is certainly not something exclusive to the cybersecurity industry. The 2020 Global Gender Gap Report ranked the United States 53rd in the world for gender equity. To put things in perspective that puts us behind Bangladesh, South Africa and Mexico, among others. The tech industry is one of the worst offenders. When asked about their previous year’s salary, 17% of women in cybersecurity said they earned between $50,000 and $99,999 per year, a full 12 percentage points less than men. Given an already saturated job market, women are unlikely to take jobs in an industry where they know they will be paid a fraction of what their male colleagues make.

 

Imposter syndrome persists

I ventured into tech in 2014 after years spent in the business world as an entrepreneur. When my husband and I founded Living Security a few years later, starting my own business in a brand-new industry where I was in the minority as a woman felt overwhelming. My first battle was overcoming imposter syndrome. I speak to a lot of women who don’t think that they have the skills necessary to succeed in cybersecurity. That’s a huge misconception.

Even if you don’t have IT experience, there are a multitude of roles available at companies from governance and risk management to marketing and communications. There are also plenty of soft skills that prove invaluable to teams. Living Security grew out of a combination of my and my husband’s strengths. Drew has 13 years of experience in cybersecurity while I brought my business, marketing and product experience to the table and applied it to starting and growing the company.

Women need to be encouraged to break down self-imposed barriers. Industry leaders willing to mentor others and share their knowledge and experience can make a huge difference in building that confidence for others.

 

Opening up learning and career paths

Though it’s a booming industry that will have an estimated 3.5 million job openings by the end of 2021, cybersecurity is often not on a lot of younger women’s radars. Women currently earn about half of science and engineering degrees, but they make up just 20% of employees in those fields. All of the issues addressed above undoubtedly contribute to this phenomenon. There’s also a lack of awareness surrounding high-paying jobs in this industry that don’t require a degree. There are plenty of tech leaders who don’t have STEM backgrounds.

Getting more women employed in tech and cybersecurity companies requires clearer pathways to thrive. There needs to be greater awareness about ways to break into the industry, and the large range of roles available. Cybersecurity is a challenging, lucrative and rewarding career that women shouldn’t be missing out on. 

Diverse and inclusive teams are the driving force behind successful companies. People of different genders, backgrounds, educational experiences and skills bring a wealth of creativity and new ideas to the table. That ultimately leads to profit and growth. Having women in leadership encourages more young women to consider careers in industries that they wouldn’t have otherwise. That leads to diverse teams and an inclusive culture that drives success. These are all things that Fortune 500 companies have clearly figured out. The cybersecurity industry needs to follow suit.

 

KEYWORDS: cyber security risk management talent gap women in cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ashley Rose is the CEO and co-founder of Living Security, and a leader in security awareness training and human risk management.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security freepik

    Cybersecurity allies: Why you need them and how to find them

    See More
  • authentication-password-freepik1170x658.jpg

    Why passwords are on the way out, and why we need them anyways

    See More
  • smartphone-app-development-freepik.jpg

    Why mobile app developers need to prioritize user data privacy and security — and what they can do to ensure it

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing