{"id":3614,"date":"2022-02-28T22:46:30","date_gmt":"2022-02-28T22:46:30","guid":{"rendered":"https:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=3614"},"modified":"2022-10-13T13:55:57","modified_gmt":"2022-10-13T13:55:57","slug":"women-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/women-in-cybersecurity\/","title":{"rendered":"Women in Cybersecurity"},"content":{"rendered":"<p>\r\n    STEM fields (science, technology, engineering, and mathematics) offer some of the fastest-growing and best-paying\r\n    careers. However, these fields tend to lack racial and gender diversity.\r\n<\/p>\r\n<p>\r\n    Long-term research tends to exclude nonbinary genders and conflate gender terms (e.g., \"woman\") with terms for sex\r\n    (e.g., \"female\"). That said, data indicates that while women make up nearly half of STEM workers as a whole, they\r\n    remain <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-resources-for-underrepresented-populations\/\">underrepresented in cybersecurity<\/a>.\r\n<\/p>\r\n<p>Women compose only 25% of the computer-related workforce, according to <a href=\"https:\/\/www.pewresearch.org\/fact-tank\/2021\/04\/14\/6-facts-about-americas-stem-workforce-and-those-training-for-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Research Center<\/a>. Similarly, <a href=\"https:\/\/cybersecurityventures.com\/women-hold-25-percent-of-cybersecurity-jobs-globally-in-2021\/\" target=\"_blank\" rel=\"noopener\">industry experts<\/a> estimate that by the end of 2021, women will fill 25% of all cybersecurity\r\n    positions.\r\n<\/p>\r\n<p>Increasing women's representation in cybersecurity can lead to promising careers for women in this growing sector. A\r\n    more diverse workforce can also help the industry by providing a variety of perspectives and problem-solving ideas.\r\n<\/p>\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    Long-term research tends to exclude nonbinary genders and conflate gender terms (e.g., \"woman\") with terms for sex (e.g., \"female\").\n  <\/div>\n<\/section>\r\n<p>The tech field needs more resources to encourage and support historically excluded groups, like women, in their tech\r\n    pursuits. This guide explores the benefits of <a href=\"https:\/\/www.cyberdegrees.org\/listings\/most-diverse-cybersecurity-schools\/\">diversity in tech and opportunities for women in cybersecurity<\/a>.\r\n<\/p>\r\n\r\n\r\n<\/p>\r\n\r\n\r\n<h2>A Brief History of Cybersecurity<\/h2>\r\n<p>Cybersecurity professionals protect computer systems from attacks by malicious actors. Cybersecurity got its start in\r\n    the 1970s, when researchers created Creeper, the first computer worm, and Reaper, the first antivirus software.\r\n<\/p>\r\n<p>Commercial antivirus programs emerged in the 1980s. The 1990s and 2000s saw a rise in professional cyberattacks.\r\n    Since then, as society has come to rely on computers for many aspects of everyday life, threats to information\r\n    security have multiplied.\r\n<\/p>\r\n<p>\r\n    The U.S. <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">lost more than $4\r\n        billion<\/a> due to cyberattacks in 2020. As <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">cyberattacks become more common<\/a>, demand for workers with\r\n    cybersecurity expertise will likely grow. The <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Bureau of Labor Statistics<\/a> (BLS) projects above-average job growth (33%) for information\r\n    security analysts between 2020 and 2030.\r\n<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"cybersecurity-demographics\" id=\"cybersecurity-demographics\"><\/a>\n\n\r\n<h3>Cybersecurity Demographics<\/h3>\r\n<p>\r\n    Men far outnumber women in cybersecurity, reflecting trends in the IT field. <a href=\"https:\/\/www.pewresearch.org\/fact-tank\/2021\/04\/14\/6-facts-about-americas-stem-workforce-and-those-training-for-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">Only 19%<\/a> of computer science bachelor's degrees went to women in 2017-18, up just 1% since\r\n    2014.\r\n<\/p>\r\n<p>\r\n    Women in information security made up only <a href=\"https:\/\/1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com\/wp-content\/uploads\/2019\/03\/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">11% of the workforce<\/a> in 2013. This number has since <a href=\"https:\/\/www.pewresearch.org\/fact-tank\/2021\/04\/14\/6-facts-about-americas-stem-workforce-and-those-training-for-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">increased to 25%<\/a>. However, seeing as <a href=\"https:\/\/www.pewresearch.org\/fact-tank\/2021\/04\/14\/6-facts-about-americas-stem-workforce-and-those-training-for-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">women make up 47%<\/a> of STEM workers overall, cybersecurity still has a long way to go.\r\n<\/p>\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    Only 19% of computer science bachelor's degrees went to women in 2017-18, up just 1% since 2014. \n  <\/div>\n<\/section>\r\n<p>Notably, these statistics fail to include nonbinary genders. Research also tends to conflate the terms \"woman\" and\r\n    \"female.\" Even with these shortcomings, data clearly indicates that women lack representation in cybersecurity,\r\n    despite some recent improvements.\r\n<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"resources\/degree-required-for-cybersecurity-career\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What degree do you need to work in cybersecurity?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>Diversity in Cybersecurity<\/h3>\r\n<p>Men still disproportionately outnumber women in cybersecurity. However, shifting demographics may create more gender,\r\n    racial, and ethnic diversity in the field.\r\n<\/p>\r\n<p>A 2018 report <a href=\"https:\/\/www.isc2.org\/Research\/Cybersecurity-Diversity#\" target=\"_blank\" rel=\"noopener noreferrer\">from (ISC)&sup2;<\/a>\r\n    found that ethnic and racial minorities in cybersecurity made up 26% of the sector&rsquo;s workforce. This is 5%\r\n    more representation than these groups see in the U.S. workforce as a whole.\r\n<\/p>\r\n<p>Despite being highly educated, workers from racial and ethnic minority groups <a href=\"https:\/\/www.isc2.org\/-\/media\/Files\/Research\/Innovation-Through-Inclusion-Report.ashx\" target=\"_blank\" rel=\"noopener noreferrer\">hold\r\n        fewer<\/a> cybersecurity management positions than the national average. Moreover, females of color earn\r\n    significantly less than others in the field.\r\n<\/p>\r\n<p>The cybersecurity industry is notoriously dominated by men. Likewise, this industry requires advanced technical\r\n    skills. As such, some women may assume that they would not like working in cybersecurity. Companies can change this\r\n    by making cybersecurity a more welcoming field, offering opportunities for success to people from historically\r\n    excluded groups.\r\n<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/diversity-in-cybersecurity\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about\r\nwhy diversity in cybersecurity matters<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"benefits-of-women-in-tech\" id=\"benefits-of-women-in-tech\"><\/a>\n\n\r\n<h2>Benefits to Having More Women in Technology<\/h2>\r\n<p>Diversity in tech offers many benefits. Including more varied viewpoints, life experiences, and problem-solving\r\n    strategies can lead to innovation. In fact, <a href=\"https:\/\/www.bcg.com\/en-us\/publications\/2018\/how-diverse-leadership-teams-boost-innovation\" target=\"_blank\" rel=\"noopener noreferrer\">a 2018 study<\/a> found that companies with above-average diversity in management reported 19%\r\n    more revenue than those with below-average management diversity.\r\n<\/p>\r\n<p>Companies lacking women's representation on their cybersecurity teams are losing out on a huge pool of talent. Demand\r\n    for skilled cybersecurity professionals is <a href=\"https:\/\/www.ibm.com\/blogs\/ibm-training\/new-cybersecurity-threat-not-enough-talent-to-fill-open-security-jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\">outpacing supply<\/a>. This makes obvious the benefits of growing the talent pool. Companies that\r\n    want to stay competitive should focus on hiring and promoting women in cybersecurity.\r\n<\/p>\r\n\r\n\r\n<h3>Benefits to Sectors and Industries<\/h3>\r\n<p><strong>Address the Labor Shortage<\/strong>: Encouraging diversity in tech can help address the labor shortage in\r\n        cybersecurity. If more women pursue cybersecurity careers, industries that need these professionals may benefit\r\n        from a larger pool of talent.\r\n<\/p>\r\n<p><strong>Stimulate Innovation and Creativity<\/strong>: Employing a diverse workforce can lead to more creativity and\r\n        innovation. This helps industries move forward and develop new technologies, in turn generating larger\r\n        profits.\r\n<\/p>\r\n<h3>Benefits to Companies and Teams<\/h3>\r\n<p>Having more women in cybersecurity benefits companies of all types and sizes. Companies with stronger women's\r\n    representation can also benefit individual teams.\r\n<\/p>\r\n<p><strong>Diverse Viewpoints<\/strong>: Women bring perspectives that often differ from men's. As such, teams representing both\r\n        these genders may access new ways of thinking and confronting obstacles.\r\n<\/p>\r\n<p><strong>Learning Opportunities<\/strong>: Companies with a diverse workforce give employees an opportunity to learn about\r\n        people different from themselves. This can contribute to better understanding about other cultures, races, and\r\n        genders.\r\n<\/p>\r\n<p><strong>Better Support for Women in the Industry<\/strong>: Encouraging more women in cybersecurity can create better\r\n        environments for current and future women in the field. These professionals can find potential role models,\r\n        connect with mentors, and feel less isolated.\r\n<\/p>\r\n\r\n\r\n<h2>How More Opportunities in Tech Benefit Women<\/h2>\r\n<p><strong>Above-Average Salaries<\/strong>: Earning a bachelor's degree in cybersecurity can open the door to lucrative <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a>. <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Bachelor_of_Science_(BS_%2F_BSc)%2C_Cybersecurity\/Salary\" target=\"_blank\" rel=\"noopener noreferrer\">Payscale reports<\/a> that graduates with a BS in cybersecurity earned $73,000 on average as\r\n        of December 2021.\r\n<\/p>\r\n<p><strong>Job Security<\/strong>: The BLS projects <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">rapid job growth<\/a> for information security analysts between 2020 and 2030. As\r\n        cyberattacks increase and more organizations rely on cloud services, the demand for cybersecurity professionals\r\n        will likely rise.\r\n<\/p>\r\n<p><strong>Sense of Accomplishment<\/strong>: Because so few women work in cybersecurity, those who build careers in the field may\r\n        feel a strong sense of personal accomplishment. It can take hard work and perseverance, but it can feel good to\r\n        prove there is a place for women in technology.\r\n<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"career-and-salary-outlook\" id=\"career-and-salary-outlook\"><\/a>\n\n\r\n<h2>Career and Salary Outlook for Women in Cybersecurity<\/h2>\r\n<p>Women in cybersecurity can pursue in-demand careers earning above-average salaries. A fast-growing, high-paying\r\n    field, cybersecurity could be a smart career choice for anyone seeking a stable job with room to advance.\r\n<\/p>\r\n<p>Demand for cybersecurity professionals outpaces supply. For example, the BLS projects a <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">33% job growth<\/a> (much faster than average) from 2020-2030 for information security analysts.\r\n    Cybersecurity professionals may advance into roles like <a\r\n        href=\"\/jobs\/security-consultant\/\">security consultant<\/a> or chief\r\n    security officer by gaining experience, pursuing higher education, and earning certifications.\r\n<\/p>\r\n<p><a href=\"\/jobs\/security-analyst\/\">Information security analysts<\/a>\r\n    earned a median annual <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">salary of $103,590<\/a> as of May 2020, significantly exceeding the national median of $41,950.\r\n    STEM workers across the board earn more than people in other occupations. However, women in technology <a href=\"https:\/\/www.pewresearch.org\/fact-tank\/2021\/04\/14\/6-facts-about-americas-stem-workforce-and-those-training-for-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">earn less than men<\/a> in equivalent roles across all ethnic and racial groups.\r\n<\/p>\r\n<p>The pay gap between men and women in tech is one of several potential challenges to women in cybersecurity.<\/p>\r\n\r\n\r\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\">Median Annual Salary<\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\n<p><strong>$103,590<\/strong><\/p>\r\n<p><small>Source: <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">BLS<\/a><\/small><\/p>\r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read more about jobs in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/government-cyber-security-careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore government cybersecurity careers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"challenges-women-face\" id=\"challenges-women-face\"><\/a>\n\n\r\n\r\n<h2>Challenges Women Face When They're Interested in Tech<\/h2>\r\n<p>Women in cybersecurity face challenges encountered less often by men. These experiences can act as barriers that keep\r\n    women from pursuing a career in the field.\r\n<\/p>\r\n\r\n<section class=\"checklist circle-x \">\n  \r\n    <ul>\r\n        <li><strong>Salary Discrepancies<\/strong>: A <a href=\"https:\/\/www.isc2.org\/-\/media\/Files\/Research\/Innovation-Through-Inclusion-Report.ashx\" target=\"_blank\" rel=\"noopener noreferrer\">2018 report<\/a> found that women of color in cybersecurity earned an average salary of\r\n            $115,000. White men in the field earned $124,000 on average. Men of color and white women earned $121,000 on\r\n         average, making women of color the field's lowest earners.\r\n        <\/li>\r\n        <li><strong>Gender Bias and Discrimination<\/strong>: Women in cybersecurity report both <a href=\"https:\/\/www.isc2.org\/-\/media\/Files\/Research\/Innovation-Through-Inclusion-Report.ashx\" target=\"_blank\" rel=\"noopener noreferrer\">overt and unconscious discrimination<\/a> in the workplace. Women say they experience\r\n            unexplained denials or delays to career advancement, exaggerated highlighting of mistakes, and tokenism more\r\n            often than men in cybersecurity.\r\n        <\/li>\r\n        <li><strong>Few Women Role Models<\/strong>: Because of the low representation of women in IT, especially in management positions,\r\n            women may struggle to imagine themselves succeeding in cybersecurity. They may also have more trouble finding\r\n            mentors.\r\n        <\/li>\r\n    <\/ul>\r\n\n<\/section>\n\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"closing-the-gender-gap\" id=\"closing-the-gender-gap\"><\/a>\n\n\r\n\r\n<h2>Closing the Gender Gap<\/h2>\r\n<p>Closing the gender gap and <a href=\"https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/\">increasing diversity in tech and cybersecurity<\/a> is critical. There is already a shortage of\r\n    cybersecurity professionals. The demand for skilled tech workers will likely continue to increase. Women can help\r\n    meet this demand to keep the world's data and information safe.\r\n<\/p>\r\n<p>Women in cybersecurity also benefit as individuals, as the field offers stable jobs paying high salaries. Initiatives\r\n    to support women in technology can stimulate more gender diversity in the most advanced leadership and management\r\n    positions.\r\n<\/p>\r\n<p>Increasing the number of women in cybersecurity also benefits the field by bringing more perspectives, creativity,\r\n    and innovation. Diverse perspectives can enrich the tech industry and improve information security.\r\n<\/p>\r\n<h3>Initiatives to Create Gender Diversity in Tech<\/h3>\r\n<p>Many initiatives aim to improve women's representation in cybersecurity.<\/p>\r\n<p>Getting more women in tech careers starts with education. Nonprofit groups, foundations, and companies offer\r\n    scholarships for women in cybersecurity. These encourage women to study tech subjects. Read on for a list of women\r\n    in cybersecurity scholarships.\r\n<\/p>\r\n<p>Professional organizations for women in cybersecurity work to increase women's representation in tech. Groups like\r\n    Women in Cybersecurity and Women's Society of Cyberjutsu offer training and mentorship programs. These programs\r\n    offer professional development opportunities to help women in cybersecurity advance in their careers.\r\n<\/p>\r\n<p>Professional groups for women in cybersecurity also provide networking events, conferences, and career resources.\r\n    Read on to learn about some of the best organizations promoting women in cybersecurity.\r\n<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n\r\n\r\n<h3>Professional Organizations for Women in Cybersecurity<\/h3>\r\n<ul>\r\n    <li>\r\n        <a href=\"https:\/\/www.wicys.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Women in Cybersecurity<\/strong><\/a>:\r\n        Created in 2012,Women in Cybersecurity strives to attract, retain, and advocate for women in the field.\r\n        Members access professional development programs, career fairs, and conferences.\r\n    <\/li>\r\n\r\n    <li>\r\n        <a href=\"https:\/\/womenscyberjutsu.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Women&rsquo;s Society of\r\n        Cyberjutsu<\/strong><\/a>: A nonprofit group trying to close the gender gap in cybersecurity, WSC\r\n        publicizes the need for women in cybersecurity. The organization offers training events, webinars, local\r\n        chapters, and career resources.\r\n    <\/li>\r\n    <li>\r\n        <a href=\"https:\/\/www.ewf-usa.com\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Executive Women's Forum on Information\r\n        Security, Risk Management, and Privacy<\/strong><\/a>: The EWF advances women in tech through\r\n        education and professional development. Members gain access to a private social network, leadership\r\n        opportunities, and an annual conference.\r\n    <\/li>\r\n    <li>\r\n        <a href=\"https:\/\/womencybersecuritysociety.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Women CyberSecurity\r\n        Society<\/strong><\/a>: This is Canada's only nonprofit group for women in cybersecurity. The\r\n        group offers benefits like mentoring, hands-on learning, and volunteer opportunities.\r\n    <\/li>\r\n    <li><a href=\"https:\/\/shesecures.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>She Secures<\/strong><\/a>: She Secures helps\r\n        women in cybersecurity meet career goals. The organization coordinates mentorship sessions, internship\r\n        opportunities, and networking events.\r\n    <\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>Scholarships for Women Interested in Tech<\/h3>\r\n<ul>\r\n    <li><a href=\"https:\/\/cra.org\/cra-wp\/scholarships-and-awards\/scholarships\/swsis\/#tab-id-1\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Parisa Tabriz PrinSWIS Scholarship<\/strong><\/a>: Created by a Google\r\n        employee, this women in cybersecurity scholarship goes to women in their junior or senior year or a\r\n        master's program. Applicants must major in information security.\r\n    <\/li>\r\n    <li><a href=\"https:\/\/cra.org\/cra-wp\/scholarships-and-awards\/scholarships\/swsis\/#tab-id-2\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Rebecca Gurley Bace SWSIS Scholarship<\/strong><\/a>: This women in\r\n        cybersecurity scholarship honors the memory of the \"den mother of cybersecurity.\" Applicants must be women\r\n        students majoring in information security.\r\n    <\/li>\r\n    <li><a href=\"https:\/\/www.infosecinstitute.com\/scholarship-opportunities-for-aspiring-cybersecurity-professionals\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Infosec Accelerate Women Scholarship<\/strong><\/a>: This scholarship includes\r\n        lifetime access to Infosec Skills. Applicants must be women pursuing cybersecurity careers and U.S.\r\n        residents.<\/strong>\r\n    <\/li>\r\n    <li><a href=\"https:\/\/iamcybersafe.org\/s\/knowbe4-womens-cyber-scholarships-\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>KnowBe4 Women in\r\n        Cybersecurity Scholarship<\/strong><\/a>: This women in cybersecurity scholarship invites\r\n        applications from women pursuing cybersecurity degrees. Applicants need a minimum 3.3. GPA and must be U.S.\r\n        citizens or permanent residents.\r\n    <\/li>\r\n    <li><a href=\"https:\/\/iamcybersafe.org\/s\/womens-scholarships\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>(ISC)&sup2; Women's\r\n        Scholarships<\/strong><\/a>: This women in tech scholarship program offers up to 10 awards worth\r\n        $1,000-$5,000. Applicants must be planning to or actively pursuing a cybersecurity degree and hold a minimum\r\n        3.3 GPA.\r\n    <\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>Educational Opportunities in Cybersecurity<\/h3>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1187635203-425x230-c-default.jpg\"\n        alt=\"Associate in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Associate in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/associate-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages1-1159379067-425x230-c-default.jpg\"\n        alt=\"Bachelor's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Bachelor's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/bachelors-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375220\/CyberDegrees.org\/best-master-cyber-programs_4743668e5\/best-master-cyber-programs_4743668e5.jpg?_i=AA\"\n        alt=\"Master's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Master's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/masters-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1075846806-425x230-c-default.jpg\"\n        alt=\"Doctorate in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Doctorate in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/doctorate-degrees-online\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1200908449-425x230-c-default.jpg\"\n        alt=\"Cybersecurity Bootcamps\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Bootcamps<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/cyber-security-bootcamps\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1213479360-425x230-c-default.jpg\"\n        alt=\"Cybersecurity Certificates\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Certificates<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"\/listings\/certificate-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n\r\n<br>\r\n<br>\r\n<h2>Frequently Asked Questions About Women in Cybersecurity<\/h2>\r\n<h3>What is the percentage of women in cybersecurity?<\/h3>\r\n<p>Industry experts project that women in cybersecurity will make up 25% of the sector's global workforce by the end of\r\n    2021. This number highlights women's continued underrepresentation in the field, but it marks a 5% increase since\r\n    2019.<\/p>\r\n<h3>Why are there less women in cybersecurity than men?<\/h3>\r\n<p>Many factors contribute to women's lack of representation in cybersecurity. Reasons include gender bias, pay\r\n    discrepancies, small numbers of women who earn computer-related degrees, and fewer women in leadership positions to\r\n    serve as role models.<\/p>\r\n<h3>Are the demographics in cybersecurity changing?<\/h3>\r\n<p>Yes, cybersecurity is slowly including more women. Women in cybersecurity composed just 20% of the workforce in 2019,\r\n    compared to an estimated 25% by the end of 2021.<\/p>\r\n<h3>Why is diversity in tech important?<\/h3>\r\n<p>Diversity in tech helps people from historically excluded groups access in-demand, high-paying jobs. Diversity can\r\n    also increase innovation, creativity, and revenue for companies. Encouraging diversity in cybersecurity can help\r\n    address the field's labor shortage.<\/p>\r\n\r\n<br>\r\n<br>\r\n<h2>Reviewed by:<\/h2>\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/f_auto,q_auto\/c_fill,g_face,r_max,f_auto,fl_lossy,q_auto:best,w_190,h_190\/v1617058478\/experts\/Angelique_Geehan.jpg\" alt=\"Portrait of Angelique Geehan\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Angelique Geehan<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-700 md:mb-0 md:pb-0\">\n      <div slot=\"contentRight\">\r\n<p>Angelique Geehan works to support and repair the connections people have with themselves and their families,\r\n    communities, and cultural practices. A queer, Asian, gender binary-nonconforming parent, Geehan founded Interchange,\r\n    a consulting group that offers anti-oppression support. She organizes as part of several groups, including the\r\n    National Perinatal Association's Health Equity Workgroup, the Health and Healing Justice Committee of the National\r\n    Queer and Trans Asian and Pacific Islander Alliance, QTPOC+ Family Circle, and Batal&aacute; Houston.<\/p>\r\n<p>Angelique Geehan is a paid member of the Red Ventures Education freelance review network.<\/p>\r\n<p><i>Page Last Reviewed Dec. 1, 2021<\/i><\/p>\r\n<\/div>\n    <\/div>\n      <\/div>\n<\/div>\n\n\n\r\n\r\n<br>\r\n<p><small><em>Featured Image: Maskot \/ Maskot \/ Getty Images<\/em><\/small><\/p>","protected":false},"excerpt":{"rendered":"The number of women in cybersecurity has grown, but the gender gap hasn&#8217;t closed. Read on to learn about the importance of diversity in tech.","protected":false},"author":5,"featured_media":3621,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-3614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=3614"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3614\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/3621"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=3614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=3614"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=3614"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=3614"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=3614"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=3614"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=3614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}