Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Professional diversity within security

By Sally Cooper
christina-wocintechchat-com-vzfgh3RAPzM-unsplash-copy.jpg
October 21, 2021

Headlines are often teeming with cautionary tales, updates and various tips and advice for managing cybersecurity in a way that aligns with business success and protection. In the press, for example, stories capture the anxiety associated with costly breaches, including high-profile attacks like the T-Mobile breach in August of this year. But they more often exclude the underlying and problematic lack of equality and diversity in the industry. 

The professional ranks in IT and cybersecurity have been puzzled by a persistent shortage of diverse talent and opportunities for people with underrepresented identities. As cybersecurity grows in significance both economically and out of necessity to combat escalating risk varieties, the diversity dilemma goes beyond a common obstacle when the industry claims that it is struggling to occupy its ranks with fresh talent. 

A problem realized with data  

Captured in recent statistics about IT professionals, diversity is more than a perceived issue, but partly explains how there is a growing shortage of diversified talent. 

According to the (ISC)² Cybersecurity Career Pursuers study, women are entering the industry at higher rates. Despite this climb, only 33% of cybersecurity professionals surveyed were women. In context, a Varonis study discovered how only 13% of Fortune 500 companies employ a woman in a cybersecurity leadership or management position.

A gender imbalance in technical roles is a problem because talent availability and workplace cultures struggle without diversity – of ideas, cultures and people. 

What are the barriers? 

Perceptions are often the most difficult barriers to overcome. Enrollment in cybersecurity programs may be diversifying, but the outcomes are still struggling to fulfill the potential of a truly diverse industry. Prospective talent, especially younger professionals, have a less than favorable view of cybersecurity: it’s little more than password protections and regular patching. A report on this reputation, which challenges hiring practices, suggests that costly misconceptions may be responsible for gaps in the workforce. When addressed, the industry can recruit more productively and diversify its pipeline. 

The diversity disparity in cybersecurity has been likened to STEM with its failings to attract a positive balance of genders and cultures. A more diversified talent pool is not easy to accomplish. Tackling misconceptions may be the first step, but spreading opportunity needs to cover considerable ground.  

Diversifying and improving the talent 

Diversifying the workplace should be underpinned by an equality of opportunity and openness to learn, develop and push beyond the limits of bias. Excellence is an unbiased ambition — one that can be promoted with respect, recognition, and transparency.

IT companies can be more proactive in challenging bias by using their workplace culture as a testbed for new talent and ideas. It starts by identifying the extent of the problem. The importance of diversity and equality for business success cannot be understated, and goals for greater diversity in new talent hires is one way to re-energize a workforce with new and exciting cultures and ideas. Recruitment is a platform for onboarding fresh ideas and new people — this is an opportunity to encourage more women and other underrepresented professionals within the industry.  

Diversity isn’t simply an objective — it’s a responsibility of a business that has the desire to promote new standards for its industry. 

Importantly, this kind of meaningful change should come from inside a business first. Having greater diversity within IT and security roles will result in stronger and more effective teams. Organizations must commit to positive change, encouraging women both internally to consider a role in cybersecurity, as well as look to recruit more diverse new hires. Breaking down conscious and unconscious bias is critical in helping organizations create a fair and equal workplace.

When businesses want to diversify their recruitment pipeline, the role of unconscious bias is often an invisible, albeit challenging obstacle to overcome. A drive to attract and recruit diverse talent can be achieved when businesses make positive strides toward or decisions about their talent, such as leveraging data insights to understand which applicant has the most suitable skills. Neutralize language across applications and invite an interviewee to be assessed by a panel or blind skills test. This will help your recruitment process expand its understanding of different employees. A balance of different solutions will help eliminate the invisible barriers of bias that could be deterring new talent. 

People create change

Diverse talent is a growing priority because its benefits can lead to greater innovation and an opportunity for a business to succeed. Diversity is impactful on business success, and this includes problem solving and teamwork. Diverse talent can facilitate a variety of perceptions, ideas and attitudes — when this works in a collaborative team environment, innovation can truly flourish. 

In the bigger picture, the diverse workforce is one that prospers from its differences — new perceptions will unlock fresh understandings and help resolve problems and other obstacles that limit a business’ success. 

In the context of cybersecurity and IT, a greater diversity of talent can create the change that the industry needs. As with other industries, people unlock potential. 

KEYWORDS: bias cyber security awareness cyber security careers diversity in security hiring practices talent gap women in cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As ramsac’s Operations Director overseeing the company’s finance and operations teams, Sally Cooper is responsible for resourcing, procurement and project and financial management. Working in IT for 30 years, Cooper is also one of the founders of the business.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0121-Diversity-Feat-slide1_900px

    Creating a diverse and inclusive workplace within security

    See More
  • earth

    The impact of diversity, equity and inclusion on your security career

    See More
  • 5 mins with Joan Pepin

    5 minutes with Joan Pepin – Diversity in cybersecurity

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!