{"id":25836,"date":"2017-03-29T05:00:40","date_gmt":"2017-03-29T12:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=25836"},"modified":"2017-06-27T13:27:44","modified_gmt":"2017-06-27T20:27:44","slug":"securing-networks-women-cyber","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/03\/securing-networks-women-cyber\/","title":{"rendered":"Securing Our Networks with Women in Cyber"},"content":{"rendered":"<p>I was honored to be asked to host a \u201cWomen in Cyber\u201d panel for the conference organizers, IQPC, at the 2017 Cyber Defense and Network Security (CDANS) conference in the United Kingdom. My distinguished fellow panelists included Jacqui Chard of the U.K.\u2019s new National Cyber Security Centre; Sherrill Nicely, the CISO of the U.S. Central Intelligence Agency; and LTC\u00a0Wendi\u00a0O.\u00a0Brown, PMP, (NATO) Coalition Exercise Planner, U.S.\u00a0European Command.<\/p>\n<p>I was struck early in our preparations by a few common themes: first, all of us had \u201cevolved into\u201d cybersecurity from a plethora of other disciplines and backgrounds, and second, we are all equally passionate about the field of cyber.<\/p>\n<p>As part of my preparation for this panel, I decided to spend some time with my female colleagues at Palo Alto Networks to learn their perspectives, from what led them to their current roles, to role models who had helped them throughout their careers, to other words of wisdom they would share with our CDANS audience. I also produced videos of each of our conversations with them, from our Senior Director of Security Operations to a Senior Software Architect and our regional CSO for Japan. The following are some highlights from these video conversations:<\/p>\n<ul>\n<li>Two women began their careers with their respective Ministries of Defense in Israel and Japan, helping them to form an important foundation upon which to build their cyber careers. I second this notion from my own experience starting out with the U.S. Defense Department. These organizations prove to be great testing grounds for you to experiment with what technologies or operations most interest you, and have valuable on-the-job training in the respective disciplines.<\/li>\n<li>One shared a story of a fellow male colleague who, having appreciated her work, had become her mentor and encouraged her to join him at several different companies. He would later help her to correct salary inequities and encourage her to be her own strong ally in her career. Another shared the story of her grandmother as an early role model, blazing new trails where few women had been before.<\/li>\n<li>Others shared the elements of their careers they enjoy most \u2013 from seeing how cyber impacts every aspect of our lives to being a proud mother to share with her children the role of cyber in protecting our digital way of life.<\/li>\n<li>One encouraged practitioners and managers to get involved personally in their organization\u2019s recruitment efforts. Giving candidates direct insights and guidance about their careers is invaluable and a wonderful way to give back.<\/li>\n<\/ul>\n<p>My research for the panel tells me that, <a href=\"https:\/\/data.oecd.org\/eduatt\/graduation-rate.htm\" rel=\"nofollow,noopener\" >while women are exceeding men in advanced technical degrees<\/a>, <a href=\"https:\/\/www.ncwit.org\/sites\/default\/files\/resources\/ncwit_women-in-it_2016-full-report_final-web06012016.pdf\" rel=\"nofollow,noopener\" >more women are leaving the technical field<\/a> (1). There are myriad reasons for this that we discussed during the panel. But the key takeaways were to encourage all potential cybersecurity professionals \u2013 regardless of where they are in the world, their gender or their degrees. Specifically:<\/p>\n<ol>\n<li><strong>Be willing to sponsor vs. just mentor.<\/strong> This means <a href=\"http:\/\/www.talentinnovation.org\/assets\/Athena-2-ExecSummFINAL-CTI.pdf\" rel=\"nofollow,noopener\" >actually going to bat for someone to ensure fairness and equal opportunities when it\u2019s needed<\/a> \u2013 I was thrilled to hear shared examples of this from the audience.<\/li>\n<li><strong>Seek employers who support cross-training of existing professionals without pushing their employees back to a junior level to begin a new pursuit.<\/strong> Many professionals have come to cybersecurity many years after choosing their initial career path, and today their employees \u2013 and indeed the broader market \u2013 are enjoying the results of their contributions.<\/li>\n<li>To quote <a href=\"https:\/\/en.wikipedia.org\/wiki\/Nuala_O\" rel=\"nofollow,noopener\" Connor\">Nuala O\u2019Connor<\/a> at a networking event many years ago, <strong>\u201cLift as you rise\u201d<\/strong> \u2013 and particularly with someone who doesn\u2019t necessarily \u201clook like you.\u201d This was guidance one of the Defense Systems Integrators gave to employees when choosing to mentor someone in their organization.<\/li>\n<li><strong>To those hiring or recruiting, don\u2019t overthink your idea of the perfect person or degree or background for this role.<\/strong> As I noted above, many successful professionals in the field today don\u2019t have the degree or background you might have anticipated. In fact, one of the government\u2019s programs introduced at CDANS is one in which employees are tested for \u201clatent talent\u201d so that the employer can realize the gifts of their<em> existing<\/em> employees for the field of cyber.<\/li>\n<\/ol>\n<p>When I finished the preparations, I reflected upon the many blessings of my own career and called my father. I thanked him for his encouragement of me to follow my own professional interests and do whatever I desired in my career. Serving in law enforcement for 31 years, he had hoped I would consider the national law enforcement agencies he suggested as prospective employers, and saw no limitation preventing me as a woman from entering that field. But ultimately for him, it was important to help me find whatever I would enjoy. We can all encourage the next generation of cybersecurity practitioners \u2013 and not be limited by where we <strong>think<\/strong> we may find them or by what their resumes may say.<\/p>\n<p>Speaking of career encouragement, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/02\/palo-alto-networks-academy-collaborates-with-vetsintech\/\">if you are a veteran, you may have a calling to continue to \u201cserve\u201d in cyber.<\/a> We\u2019d love to have you as a member of the team. Cyber is an honorable calling \u2013 and regardless of how any of us got here, I wish you profound success in your careers and the hope that, regardless of where you are or go in your career, that you lift and encourage others as you rise.<\/p>\n<h6>(1) <a href=\"https:\/\/www.oecd.org\/gender\/data\/shareofwomengraduatesbyfieldofeducation.htm\" rel=\"nofollow,noopener\" >OECD Education at a glance, 2015<\/a>, <a href=\"http:\/\/journals.plos.org\/plosone\/article?id=10.1371%2Fjournal.pone.0157447\" rel=\"nofollow,noopener\" >Study from CSU: Women 1.5 Times More Likely to Leave STEM Pipeline after Calculus Compared to Men: Lack of Mathematical Confidence a Potential Culprit 2016<\/a>, <a href=\"https:\/\/www.ncwit.org\/sites\/default\/files\/resources\/ncwit_women-in-it_2016-full-report_final-web06012016.pdf\" rel=\"nofollow,noopener\" >Source<\/a>.<\/h6>\n<p>To learn more about our other activities at CDANS 2017 this year, please visit:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/gov-cdans-2017-keeping-cybersecurity-skills-sharp-cyber-range\/\">CDANS 2017: Keeping Cybersecurity Skills Sharp With Cyber Range <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/securing-networks-women-cyber\/\">Securing Our Networks with Women in Cyber<\/a><\/li>\n<\/ul>\n<h3><a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federalhome.html\"><img decoding=\"async\"  class=\"alignnone size-medium lozad\"  data-src=\"https:\/\/ignite.paloaltonetworks.com\/federal\/assets\/img\/masthead_federal.png\" alt=\"\" width=\"1000\" \/><\/a><\/h3>\n<h3>Federal Ignite '17 Security Conference: Washington, DC<\/h3>\n<p>If you are in the U.S. government, come to <a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federalhome.html\">Federal Ignite 2017<\/a> to learn more about what we\u2019re doing for you and your peers to make fast threat prevention through automation a reality.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pamela Warren explores the participation of women in cybersecurity while preparing to host a \"Women in Cyber\" panel at this year's Cyber Defense and Network Security conference.<\/p>\n","protected":false},"author":47,"featured_media":20199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,484],"tags":[3342,3459,2922],"coauthors":[717],"class_list":["post-25836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-government","tag-cdans","tag-women-in-cyber","tag-women-in-tech"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/government-web-banner-650x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=25836"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25836\/revisions"}],"predecessor-version":[{"id":25926,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25836\/revisions\/25926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20199"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=25836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=25836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=25836"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}