{"id":81176,"date":"2018-03-28T09:00:31","date_gmt":"2018-03-28T16:00:31","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=81176"},"modified":"2023-05-15T23:13:07","modified_gmt":"2023-05-16T06:13:07","slug":"working-towards-a-more-diverse-future-in-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/","title":{"rendered":"Working towards a more diverse future in security"},"content":{"rendered":"

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while women\u2019s issues were brought to the forefront, there are still opportunities to improve. I want to share new learnings based on my experiences this year and as an update to my earlier post, How to solve the diversity problem in security<\/em><\/a>.<\/p>\n

Two personal interactions that are top of mind reinforced my belief there is much work to be done. If you follow me on Twitter (@ajohnsocyber<\/a>) I commented on both at the time they occurred. In one instance, I was interviewing a candidate for a role in my organization. We were discussing MFA, and he felt the need to stop me, educate and inform me of the error of my thinking. I don\u2019t claim to be a subject matter expert about all topics related to cybersecurity\u2014no one could be\u2014but I know a fair bit about MFA. His dismissive tone and attitude certainly did not set the right tone of an interview. The second incident occurred whilst I was presenting to a large group of customers. A male colleague interrupted me to say, \u201cWhat she meant to say was\u2026.\u201d Actually, what I meant to say was exactly what I said \u2014but thank you for that moment of classic mansplaining. You see, no matter your rank, role, position or expertise, there are still those who choose to minimize your knowledge, expertise or experience. While I cannot definitively say these two incidents occurred because I am a woman, I can tell you the candidate feedback from male interviewees was not the same, and the man in question did not interrupt male speakers at the same event where he interrupted me.<\/p>\n

So, as I revisit this blog post<\/a> for 2018, I also want to highlight some really positive events of the past 12 months. Microsoft believes in diversity 365 days a year, and we demonstrate it with solid actions. I am inspired not only by the women leaders in our organization, but also by our strong male allies who advocate for recruiting and promoting diverse talent. We simply cannot accomplish this work without the support of male allies. I am fortunate, at Microsoft, to actively and frequently work with a large group of well-known security professionals \u2013 including many talented women. I look forward to meeting and working with many more who are surely part of this company now or who will be compelled to join. We continue to invest in talent that challenges the way we think, talent that changes the organization, talent that truly embraces the \u201clearn it all, not know it all\u201d culture our CEO Satya Nadella has built.<\/p>\n

So, whilst as an industry we have a long road ahead of us to fully embrace diversity, we have planted the seeds. In my thirty years in tech, I have never felt the energy or seen this level of commitment and passion toward inclusion. I am proud to be part of the solution and fully committed to helping steer the ship\u2026.<\/p>\n","protected":false},"excerpt":{"rendered":"

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while women\u2019s issues were brought to […]<\/p>\n","protected":false},"author":61,"featured_media":81230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3678],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[1849],"class_list":["post-81176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-multifactor-authentication","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nWorking towards a more diverse future in security | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Working towards a more diverse future in security | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while women\u2019s issues were brought to […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-28T16:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:13:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ann Johnson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ann Johnson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/\",\"@type\":\"Person\",\"@name\":\"Ann Johnson\"}],\"headline\":\"Working towards a more diverse future in security\",\"datePublished\":\"2018-03-28T16:00:31+00:00\",\"dateModified\":\"2023-05-16T06:13:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\"},\"wordCount\":547,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg\",\"keywords\":[\"Microsoft Security Insights\",\"Security strategies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\",\"name\":\"Working towards a more diverse future in security | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg\",\"datePublished\":\"2018-03-28T16:00:31+00:00\",\"dateModified\":\"2023-05-16T06:13:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg\",\"width\":2592,\"height\":1728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Working towards a more diverse future in security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Working towards a more diverse future in security | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/","og_locale":"en_US","og_type":"article","og_title":"Working towards a more diverse future in security | Microsoft Security Blog","og_description":"Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while women\u2019s issues were brought to […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/","og_site_name":"Microsoft Security Blog","article_published_time":"2018-03-28T16:00:31+00:00","article_modified_time":"2023-05-16T06:13:07+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security-1024x683.jpg","type":"image\/jpeg"}],"author":"Ann Johnson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ann Johnson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/","@type":"Person","@name":"Ann Johnson"}],"headline":"Working towards a more diverse future in security","datePublished":"2018-03-28T16:00:31+00:00","dateModified":"2023-05-16T06:13:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/"},"wordCount":547,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg","keywords":["Microsoft Security Insights","Security strategies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/","name":"Working towards a more diverse future in security | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg","datePublished":"2018-03-28T16:00:31+00:00","dateModified":"2023-05-16T06:13:07+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/03\/Image-diversity-in-security.jpg","width":2592,"height":1728},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/28\/working-towards-a-more-diverse-future-in-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Working towards a more diverse future in security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/81176"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=81176"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/81176\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/81230"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=81176"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=81176"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=81176"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=81176"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=81176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=81176"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=81176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}