The impact of women in computer security


Computer security remains one of the most dynamic and interesting technological sectors. However, this sector needs a systemic change in the representation and compensation of women.

Wawiwa, our trusted partner, conducted a case of study on the importance of women in the computer industry. In collaboration with Cyber-Tech Institute of Australia, the gender gap has been analyzed in the IT security sector.

Gender gap and income inequalities

A Guide for Women in Cybersecurity | CyberDegrees.org

According to this study, it was found that women represent only a quarter (24%) of the total global workforce in the field of IT security, which means about 840,000 women in a job of 3.5 million people. Despite this problem, there is a significant discrepancy between women and men, with women who earn less than their male colleagues in this sector. For example, in the United States, the average annual salary for women in computer security is $ 62,000, compared to $ 91,000 for men.

Women in leadership roles

In addition, the study highlights the fact that women hold most of the high -level leadership positions in Cyber ​​organizations, which indicates a greater presence of women in the upper hierarchy of these organizations. As for the situation in Australia, the technology is identified as the second greater contribution to the country’s economy and Australia is recognized as the sixth most dedicated computer economy in the Asia-Pacific region. However, only 18% of Australian computer security professionals are women, that is, 17,000 out of a total of over 134,690 professionals.

The study also underlines strong topics to increase the number of women in IT security, such as the benefits of diversity, innovation, emotional empathy and non -occupied perspective, which are all precious skills for IT security.

Examples of pioneer women in computer security

There is still a lot of work to guarantee an adequate representation of women in the IT security sector. In the meantime, we can celebrate some remarkable examples of women in this sector:

Nasrin Rezai

  • He is currently senior vice -president and responsible for the security of Verizon information, where he is responsible for the security strategy of information, policies, standards, architecture and processes.
  • Previously he held the global information and product information position of the product in general Electric, where he was responsible for the IT security strategy and the operations for the products and the GE company.
  • He also held leadership positions in computer security at GE Capital, State Street Bank and Cisco Systems.
  • He has over 20 years of experience in technology and is passionate about promoting engineering and architecture in the design of security solutions for large companies.

Red clar

  • It is CEO of (ISS) ², a non -profit global organization that focuses on the education and certification of IT security specialists.
  • Previously, he performed executive functions at the Association of International Certificated Professional Accounting Authorities, the California Society of Cpas and Calcpa Education Foundation.
  • It has vast experience in the management of teams and in the generation of income from products and services in the field of education and professional certification.

Dr. Alissa Abdullah

  • Vice Chief Security Officer and Vice -President Senior of Emerging Corporate Security Solutions (2019 – Present). In this position, he leads the security initiatives for emerging solutions.
  • Ciso in Xerox (October 2016 – September 2019), where he was responsible for the company’s information security strategy.
  • He carried out important roles in computer security in Stryker and in the executive office of the president, the White House, where he was deputy director of information (2012-2015).
  • He has been involved in the education and training of future technological leaders, being a professor at the University of California, Berkeley since 2021.

Because the presence of women in cyber security matters?

Research suggests that when women are well represented in technological and IT roles, organizations are increasing, diversity improves and innovation is stimulated. In addition, this can have a positive impact on young women who are looking for models to follow and career opportunities in technology. It is essential that these trends continue and amplify in the future.

Our conclusion?

In a dynamic and constantly expanding industry, such as IT security, the predominance of men is not necessarily negative. However, it is essential to be aware that the lack of gender equality is a real problem that limits the potential of the entire sector.

As Natasha Salash, consultant Consultant, says, «» «Behind every functional company there is a woman in the computer field!«This observation reminds us that, although men are well represented, women bring an invaluable value and unique essential perspectives for the progress and diversity of the field.

We hope that in the future, computer security will become an area in which gender diversity is not only accepted, but also celebrated. It is not a question of criticizing male predominance, but of encouraging a more fair participation. Women are not excluded from this sector, but are sub -representative. Therefore, bringing more women to computer security will not only add new and precious perspectives, but will also help increase innovation and efficiency on the field.

It is time to recognize and encourage women’s contributions in IT security, so that the technological industry really reflects the talent and diversity in which we live. By promoting equity and inclusion, we can build a future in which IT security is not only a profession dominated by men, but a vibrant and accessible field for all those who are ready to contribute to its development.

latest posts published

Quo vadis Windows Mobile? – Microsoft’s last chance with Windows 10 Mobile

After Microsoft successfully introduced Windows 10 on desktop systems and tablets in the summer of ...

Outlook alternative: four practical programs compared

Almost everyone is familiar with Microsoft Outlook. The email program is part of the standard ...

Instructions: Permanently delete downloads – WinTotal.de

Delete Downloads: A keyword that comes to mind of every PC user when looking at ...

How to choose the best laptop

How do I choose the best laptop? Who makes the best laptops: Asus, Acer, Lenovo, ...

Why is brand authenticity important and how can you achieve it?

In a world where consumers are bombarded with thousands of advertising messages daily, standing out ...

Niche marketing – Media consultancy agency

Small and medium-sized businesses face the challenge of standing out. Mass marketing may work for ...

Create the perfect holiday video yourself on your PC

It's never been easier for laypeople to shoot and edit professional videos. What we mean ...

How to choose the right e-commerce platform for your business

If you plan to start an online business or migrate your existing business to a ...

Hardware and software investments: find the right business loan in simple steps

Liquidity plays an important role in many businesses and also when starting new businesses. But ...

This is what lies behind the attack on software weaknesses

Zero-day exploits are attacks originating from the Internet that Exploit software vulnerabilities, for which there ...

Leave a Reply

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *