Skip to main content

A Place at the Table - Part 1

December 02, 2015

Last year, I put together a presentation centered on women in IT security called, "A Place at the Table." The talk explored the reasons why women may not be attracted to our industry and how we can become better mentors to young women interested in technology. Some really compelling conclusions came out of my research and exploration into the topic. Due to the overwhelming interest in the topic, I decided to dive a little deeper into all of this and turn it into a blog series. I thought it best to start the series with a general overview of what I have discovered during my research, which will include a lot of information from the presentation itself.

Everyone in the IT security space is aware that we need to grow our workforce. According to Pew Research Center, the number of women far exceed the number of men enrolling in college and many are going into science, technology, engineering, and mathematics (STEM) majors, but not engineering and technology (ET) majors. Randy Olson put the numbers together for us. In 2012, 40-45% of the degrees in math, statistics and physical science were awarded to women, although the percentages are much lower for engineering and computer science. These numbers tell me that we have an untapped resource and we need to figure out how we can better leverage that resource. We need to build our workforce not only from the male population, but also from the female population.

I've been approached over the years by people from within our industry, and outside it, who are curious about what it is like to be a woman in my field, so I wanted to not only open up the conversation, but go on a bit of exploration of what we can all be aware of to inspire change. Of course, in discussing a topic of this nature, generalizations are necessary and these ideas may not apply to everyone. That, I guess, is the most important disclaimer going forward.

Women have always been a part of technology. Ada Lovelace is one of my favorite examples. She was born in 1815 and was arguably the very first computer programmer. How is that possible? Well, that's where the argument comes in. Most accept her as the first computer programmer because she wrote the first algorithm meant to be executed by a machine. The machine was called the "Analytical Engine" and never came to fruition, but Ada's algorithm was considered to be so significant her notes were republished in 1953. The DoD named a military standard language (Ada) after her in 1980 and there's a day in mid-October called Ada Lovelace Day to celebrate women in STEM careers.

Since Sheryl Sandberg published Lean In the conversation around the lack of women in technology careers has really taken off, but it made me look back over my career. I came to realize that though there are few women in technology generally speaking, there are far fewer in IT security. I sought out to attempt to discover why. My research exposed some interesting opinions and theories. My original presentation went into detail about the obstacles women face in male dominated careers.  These ideas and experiences are important to share as well as understand in order to be effective mentors and will be revisited in future blogs within this series. Whether we are IT security business owners, C-level executives, parents or teachers, we need to become better and more effective mentors to women interested in STEM careers. We also need to understand the qualities women possess and can bring to the table to enhance our business.

In the second part of this blog post, I will explore how we all can become better mentors and the qualities women possess that allows them to thrive in the IT security field.

Continue to Part 2

Related Blogs

December 03, 2015

A Place at the Table - Part 2

In the first part of this blog series, I explored the shortage of women in IT security and talked about the fact that women have been a part of techno...

See Details

February 28, 2018

Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about contr...

See Details

March 08, 2018

Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security strate...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Related Insights

December 10, 2014

Building an Information Security Program from Scratch | Optiv

The unfortunate reality of today’s business world is that information security breaches are an everyday occurrence. A quote that is thrown around in t...

See Details

September 22, 2014

The Key to a Strong IT Security Program | Optiv

Over the years, I have worked in top positions in the security departments of several major enterprises, which has given me insight into what separate...

See Details

October 13, 2017

Cybersecurity Awareness: Take Control of Your Identity

October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness a...

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.