{"id":90757,"date":"2020-03-19T09:00:52","date_gmt":"2020-03-19T16:00:52","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90757"},"modified":"2023-05-15T23:12:21","modified_gmt":"2023-05-16T06:12:21","slug":"welcoming-more-women-in-cybersecurity-power-mentorships","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/19\/welcoming-more-women-in-cybersecurity-power-mentorships\/","title":{"rendered":"Welcoming more women into cybersecurity: the power of mentorships"},"content":{"rendered":"
From the way our industry tackles cyber threats, to the language we have developed to describe these attacks, I\u2019ve long been a proponent to challenging traditional schools of thought\u2014traditional cyber-norms\u2014and encouraging our industry to get outside its comfort zones. It\u2019s important to expand our thinking in how we address the evolving threat landscape. That\u2019s why I\u2019m not a big fan of stereotypes; looking at someone and saying they \u201cfit the mold.\u201d Looking at my CV, one would think I wanted to study law, or politics, not become a cybersecurity professional. These biases and unconscious biases shackle our progression. The scale of our industry challenges is too great, and if we don\u2019t push boundaries, we miss out on the insights that differences in race, gender, ethnicity, sexuality, neurology, ability, and degrees can bring.<\/p>\n
As we seek to diversify the talent pool, a key focus needs to be on nurturing female talent. Microsoft has hired many women in security, and we will always focus on keeping a diverse workforce. That\u2019s why as we celebrate Women in Cybersecurity Month and International Women\u2019s Day, the security blog will feature a few women cybersecurity leaders who have been implementing some of their great ideas for how to increase the number of women in this critical field. I\u2019ll kick off the series with some thoughts on how we can build strong mentoring relationships and networks that encourage women to pursue careers in cybersecurity.<\/p>\n
There are many women at Microsoft who lead our security efforts. I\u2019m incredibly proud to be among these women, like Joy Chik, Corporate Vice President of Identity, who is pushing the boundaries on how the tech industry is thinking about going passwordless, and Valecia Maclin, General Manager of Security Engineering, who is challenging us to think outside the box when it comes to our security solutions. On my own team, I think of the many accomplishments of \u00a0Ping Look, who co-founded Black Hat and now leads our Detection and Response Team (DART), Sian John, MBE, who was recently recognized as one of the top 50 influencers in cybersecurity in the U.K., and Diana Kelley, Microsoft CTO, who tirelessly travels to the globe to share how we are empowering our customers through cybersecurity\u2014just to name a few. It\u2019s important we continue to highlight women like these, including our female cybersecurity professionals at Microsoft who made the Top 100 Cybersecurity list in 2019<\/a>. The inspiration from their accomplishments goes far beyond our Microsoft campus. These women represent the many Microsoft women in our talented security team. This month, you\u2019ll also hear from some of them in subsequent blog posts on how to keep the diverse talent you already have employed. And to conclude the month, Theresa Payton, CEO at Fortalice Solutions, LLC., and the host of our CISO Spotlight series<\/a> will share tips from her successful experience recruiting talented women into IT and cybersecurity.<\/p>\n You\u2019ve heard me say this many times, and I truly believe this: As an industry, we\u2019ve already acknowledged the power of diversity\u2014in artificial intelligence (AI). We have clear evidence that a variety of data across multiple sources and platforms enhances and improves AI and machine learning models. Why wouldn\u2019t we apply that same advantage to our teams? This is one of several reasons why we need to take diversity and inclusion seriously:<\/p>\n Mentorship can be a powerful tool for increasing the number of women in cybersecurity. People select careers that they can imagine themselves doing. This process starts young. Recently a colleague\u2019s pre-teen daughter signed up for an after-school robotics class. When she showed up at the class, only two other girls were in the room. Girls are opting out of STEM before they can (legally) opt into a PG-13 movie. But we can change this. By exposing girls to technology earlier, we can reduce the intimidation factor and get them excited. One group that is doing this is the Security Advisor Alliance<\/a>. Get involved in organizations like this to reach girls and other underrepresented groups before they decide cybersecurity is not for them.<\/p>\n Mentoring young people is important, but to solve the diversity challenges, we also need to bring in people who started on a different career path or who don\u2019t have STEM degrees. You simply won\u2019t find the talent you need through the anemic pipeline of college-polished STEM graduates. I recently spoke with Mari Galloway, a senior security architect in the gaming industry and CEO of the Women’s Society of Cyberjutsu (WSC) about this very topic in my podcast. She agreed on the importance of finding a mentor, and being a mentee.<\/p>\n Those seeking to get into cybersecurity need a network that provides the encouragement and constructive feedback that will help them grow. I have mentored several non-technical women who have gone on to have successful roles in cybersecurity. These relationships have been very rewarding for me and my mentees, which is why I advocate that everybody should become a mentor and a mentee.<\/p>\n If you haven\u2019t broken into cybersecurity yet, or if you are in the field and want to grow your career, here are a few tips:<\/p>\n For those already in cybersecurity, be open to those from the outside seeking guidance, especially if they don\u2019t align with traditional expectations of who a cybersecurity professional is.<\/p>\n A mentorship is only going to be effective if the mentee gets valuable feedback and direction from the relationship. This requires courageous conversations. It’s easy to celebrate a mentee’s visible wins. However, those moments are the result of unseen trench work that consists of course correcting and holding each other accountable to agreed upon actions. Be prepared to give and receive constructive, actionable feedback.<\/p>\n More women and diverse talent should be hired in security not only because it is the right thing to do, but because gaining the advantage in fighting cybercrime depends on it. \u200bMentorship is one strategy<\/a> to include girls before they opt out of tech, and to recruit people from non-STEM backgrounds.<\/p>\n Watch for Diana Kelley\u2019s blog about how to create a culture that keeps women in the field.<\/p>\n Learn more about Girls Go Cyberstart<\/a>.<\/p>\n Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity. Or reach out to me on\u00a0LinkedIn<\/a>\u00a0or\u00a0Twitter<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" I\u2019ve long been a proponent to challenging traditional schools of thought\u2014traditional cyber-norms\u2014and encouraging our industry to get outside its comfort zones.<\/p>\n","protected":false},"author":96,"featured_media":90764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3664,3683],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1849],"class_list":["post-90757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-ai-and-machine-learning","topic-security-management","tag-microsoft-security-insights"],"yoast_head":"\nOur cyber teams must be as diverse as the problems we are trying to solve<\/h3>\n
\n
Mentoring networks must start early<\/h3>\n
Building a strong network<\/h3>\n
\n
\n
Mentorship relationships that yield results<\/h3>\n
Creating inclusive cultures<\/h3>\n
What\u2019s next<\/h3>\n