Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Professional diversity within security

By Sally Cooper
christina-wocintechchat-com-vzfgh3RAPzM-unsplash-copy.jpg
October 21, 2021

Headlines are often teeming with cautionary tales, updates and various tips and advice for managing cybersecurity in a way that aligns with business success and protection. In the press, for example, stories capture the anxiety associated with costly breaches, including high-profile attacks like the T-Mobile breach in August of this year. But they more often exclude the underlying and problematic lack of equality and diversity in the industry. 

The professional ranks in IT and cybersecurity have been puzzled by a persistent shortage of diverse talent and opportunities for people with underrepresented identities. As cybersecurity grows in significance both economically and out of necessity to combat escalating risk varieties, the diversity dilemma goes beyond a common obstacle when the industry claims that it is struggling to occupy its ranks with fresh talent. 

A problem realized with data  

Captured in recent statistics about IT professionals, diversity is more than a perceived issue, but partly explains how there is a growing shortage of diversified talent. 

According to the (ISC)² Cybersecurity Career Pursuers study, women are entering the industry at higher rates. Despite this climb, only 33% of cybersecurity professionals surveyed were women. In context, a Varonis study discovered how only 13% of Fortune 500 companies employ a woman in a cybersecurity leadership or management position.

A gender imbalance in technical roles is a problem because talent availability and workplace cultures struggle without diversity – of ideas, cultures and people. 

What are the barriers? 

Perceptions are often the most difficult barriers to overcome. Enrollment in cybersecurity programs may be diversifying, but the outcomes are still struggling to fulfill the potential of a truly diverse industry. Prospective talent, especially younger professionals, have a less than favorable view of cybersecurity: it’s little more than password protections and regular patching. A report on this reputation, which challenges hiring practices, suggests that costly misconceptions may be responsible for gaps in the workforce. When addressed, the industry can recruit more productively and diversify its pipeline. 

The diversity disparity in cybersecurity has been likened to STEM with its failings to attract a positive balance of genders and cultures. A more diversified talent pool is not easy to accomplish. Tackling misconceptions may be the first step, but spreading opportunity needs to cover considerable ground.  

Diversifying and improving the talent 

Diversifying the workplace should be underpinned by an equality of opportunity and openness to learn, develop and push beyond the limits of bias. Excellence is an unbiased ambition — one that can be promoted with respect, recognition, and transparency.

IT companies can be more proactive in challenging bias by using their workplace culture as a testbed for new talent and ideas. It starts by identifying the extent of the problem. The importance of diversity and equality for business success cannot be understated, and goals for greater diversity in new talent hires is one way to re-energize a workforce with new and exciting cultures and ideas. Recruitment is a platform for onboarding fresh ideas and new people — this is an opportunity to encourage more women and other underrepresented professionals within the industry.  

Diversity isn’t simply an objective — it’s a responsibility of a business that has the desire to promote new standards for its industry. 

Importantly, this kind of meaningful change should come from inside a business first. Having greater diversity within IT and security roles will result in stronger and more effective teams. Organizations must commit to positive change, encouraging women both internally to consider a role in cybersecurity, as well as look to recruit more diverse new hires. Breaking down conscious and unconscious bias is critical in helping organizations create a fair and equal workplace.

When businesses want to diversify their recruitment pipeline, the role of unconscious bias is often an invisible, albeit challenging obstacle to overcome. A drive to attract and recruit diverse talent can be achieved when businesses make positive strides toward or decisions about their talent, such as leveraging data insights to understand which applicant has the most suitable skills. Neutralize language across applications and invite an interviewee to be assessed by a panel or blind skills test. This will help your recruitment process expand its understanding of different employees. A balance of different solutions will help eliminate the invisible barriers of bias that could be deterring new talent. 

People create change

Diverse talent is a growing priority because its benefits can lead to greater innovation and an opportunity for a business to succeed. Diversity is impactful on business success, and this includes problem solving and teamwork. Diverse talent can facilitate a variety of perceptions, ideas and attitudes — when this works in a collaborative team environment, innovation can truly flourish. 

In the bigger picture, the diverse workforce is one that prospers from its differences — new perceptions will unlock fresh understandings and help resolve problems and other obstacles that limit a business’ success. 

In the context of cybersecurity and IT, a greater diversity of talent can create the change that the industry needs. As with other industries, people unlock potential. 

KEYWORDS: bias cyber security awareness cyber security careers diversity in security hiring practices talent gap women in cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As ramsac’s Operations Director overseeing the company’s finance and operations teams, Sally Cooper is responsible for resourcing, procurement and project and financial management. Working in IT for 30 years, Cooper is also one of the founders of the business.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Women in cybersecurity training and virtual conference

    Virtual cybersecurity conference to promote women and diversity within the industry

    See More
  • SEC0121-Diversity-Feat-slide1_900px

    Creating a diverse and inclusive workplace within security

    See More
  • GWL Realty Advisors: Diversity of Clients, Diversity of Security Needs

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing