Translate

Search This Blog

Search Tool




Apr 10, 2019

Analysis | The Cybersecurity 202: There are even fewer women in U.S. government cybersecurity than there are globally

By Joseph Marks



THE KEY

An unidentified female soldier is being trained by the Israeli army to work in the field of cybersecurity. (IDF)
Cybersecurity is notorious for being a male-dominated field. But the U.S. government has an even smaller percentage of women working in cybersecurity jobs than the global average of women working in the field.
About 11 percent of U.S. federal, state and local government cybersecurity pros are women, according to data provided to me by (ISC) 2, a nonprofit organization that provides cybersecurity certifications. About 24 percent of cybersecurity pros globally are women, according to the broader (ISC) 2 report that data is drawn from. Those women also tend to be younger and better educated than their male counterparts, the report found.
But the report's findings actually reveal a bigger problem: It's incredibly difficult to answer the question of how many women work in cybersecurity.
That's because the definition of what counts as a cybersecurity worker can vary greatly from one organization — and one study — to another. All this makes it even trickier to tackle long-standing issues such as low female representation in the workforce, because no one knows just how big the problem is or whether it’s getting better or worse.
“We don’t have a good read on who is actually in the cybersecurity workforce,” Laura Bate, a policy analyst with the New America think tank's Cybersecurity Initiative, told me. “It makes it hard to know what works, to come up with empirical proof of what policies, either by corporate decision-makers or government policymakers, work in increasing the recruitment and retention of women in cybersecurity.”
The ISC (2) report is a good example of this. The organization had previously counted people as cybersecurity workers only if they had specific titles or filled specific roles at an organization, such as chief information security officer.
When using that metric in previous studies, (ISC) 2 found women held only 11 percent of global cybersecurity jobs. This time, the organization asked survey respondents whether they spent more than one-fourth of their time on cybersecurity, and the percentage of women in global cybersecurity jobs more than doubled.
“By broadening the scope of our research to encompass the men and women doing the work in organizations of all sizes across public and private sectors, and around the globe, we found a significant increase in the number of women in the cybersecurity workforce,” the report's authors write.
That shift probably does give a more accurate representation of the percentage of women working in cybersecurity because the field is difficult to narrow down to just particular job titles, said Kiersten Todt, resident scholar at the University of Pittsburgh Institute for Cyber Law, Policy, and Security.
But it also makes it impossible to tell whether more women are actually entering the cybersecurity field or if the increase is just due to methodology changes, Bate said. And that question hasn’t been effectively answered by other studies, Bate told me, despite a heavy focus by the industry on recruiting more women into the field.
When Bate and a co-author, Elizabeth Weingarten, published a New America study in March focused on recruiting more women into cybersecurity, they were hampered by the lack of solid information about how many women were in the field.
“Most of the growth seems to correlate to methodological shifts,” Bate said.
It's even tougher to gather solid information about the federal government’s cybersecurity workforce because agencies don’t use consistent definitions for who counts as a cybersecurity worker — a point that the government’s own auditors regularly rail against.
When (ISC) 2 looked specifically at the federal government in a 2017 report, it found that 15 percent of cybersecurity pros were women — but that was using the old definition that the organization has since disavowed.
When I asked the Office of Personnel Management, the agency responsible for tracking federal employee categories, a representative pointed me toward a (pretty clunky) database that was capable of breaking down the percentage of women in government information technology jobs — but not specifically in cybersecurity. As of September 2018, women held 27 percent of those government IT jobs, according to that database.
One thing is clear despite all the differences in figures: The percentage of men in cybersecurity jobs is far greater than women. And that's a major problem given the national shortage of about 300,000 cybersecurity jobs and the rapidly growing capabilities of cyber criminals, Bate told me.
“We cannot secure our systems if we don’t have people to fill those jobs — and if we’re only tapping half the population, we’re not meeting that need,” she said.
But the lack of widely accepted, accurate numbers crowds out more elaborate conversations about what sort of work those women are doing in the field and whether they’re getting the right opportunities to advance, said Todt, who was executive director of an Obama-era commission on long-range cybersecurity issues including the cybersecurity workforce.
“I absolutely believe gender diversity is essential, but you’ve got to be thoughtful and deliberate and do it the right way,” she said. “You’re always going to want more than what exists, but if it’s growing that’s encouraging.”
You are reading The Cybersecurity 202, our must-read newsletter on cybersecurity policy news.
Not a regular subscriber?

PINGED, PATCHED, PWNED

U.S. Sen. Thomas Carper (D-Del.) asks a question of Homeland Security Secretary Kirstjen Nielsen. (Jacquelyn Martin/AP)
PINGED: Republican and Democratic senators expressed alarm Tuesday at a Trump administration housecleaning at the Homeland Security Department that included the resignations of Secretary Kirstjen Nielsen, acting deputy secretary Claire Grady and U.S. Secret Service Director Randolph D. “Tex” Alles.
Sen. Tom Carper (D-Del.) said on Twitter that the forced resignations could undermine the department's cybersecurity mission and were creating “turmoil” that was “unacceptable.”
To see an agency as important as @DHSGov — tasked with working on cybersecurity, counterterrorism, and border security issues — in such turmoil, is unacceptable. https://t.co/tD61YNhxq2
— Senator Tom Carper (@SenatorCarper) April 9, 2019
Sen. Mitt Romney (R-Utah) called the situation “dangerous” given DHS’s many responsibilities.
I am deeply troubled by the vacancies at @DHSgov. It is dangerous given what’s happening at the border and dangerous given the broad responsibility that the Department of Homeland Security has for protecting our nation. pic.twitter.com/jtK9GF28YU
— Senator Mitt Romney (@SenatorRomney) April 9, 2019

A new voting machine that prints a paper record on display at a polling site in Conyers, Ga. (David Goldman/AP)
PATCHED: The voting machine company Election Systems and Software has shared its entire suite of hardware and software for independent cybersecurity vetting by Idaho National Laboratory, the company said Tuesday.
The news came in a letter from ES&S to four Democratic senators who asked what the company was doing to secure the 2020 election. Lawmakers have criticized ES&S and other major election systems manufacturers for being too opaque about their security practices.
The company has also installed new cybersecurity protections on its corporate networks including adding anti-phishing measures to its email systems, the letter states.

Signage at the corporate headquarters of Equifax in Atlanta. (Mike Stewart/AP)
PWNED: Equifax and its Canadian division fell short of their privacy obligations, worsening the toll of a 2017 data breach that compromised the personal information of more than 140 million people, Canada’s privacy commissioner said, according to a Reuters report.
Equifax Canada has entered into a compliance agreement to address the concerns, Reuters reported.
“Given the vast amounts of highly sensitive personal information Equifax holds . . . it was completely unacceptable to find such significant shortcomings in the company’s privacy and security practices,” Privacy Commissioner Daniel Therrien said.
PUBLIC KEY
Cybersecurity news from the public sector:

Programmers warned that the 2018 launch of California's "motor voter" system could be a debacle, but state officials rolled it out anyway, according to interviews and an exclusive Times review of documents. The launch occurred even after engineers detected signs of an international hacking attempt.
Los Angeles Times

At a time when corporations are planning to blanket the heavens with high-tech hardware, the space industry is responding with the creation of an information sharing and analysis center.
Cyberscoop


The agency is hungry for more commercial cloud.
Nextgov
PRIVATE KEY
Cybersecurity news from the private sector:

Pregnancy-tracking apps such as Ovia have climbed in popularity as fun, friendly companions for the daunting uncertainties of childbirth. But they have also become powerful monitoring tools for employers and health insurers.
Drew Harwell
CHAT ROOM
Have you heard that paranoid tale about how Google, Facebook and other tech giants are actually eavesdropping on you through your phone all the time to deliver targeted ads? It's almost certainly a myth, as a few experts explained on Twitter on Tuesday.
First, University of Southern California law professor Orin Kerr took the legal angle in a lengthy thread:
I know a lot of very smart people who believe their phones are always listening to them to send them ads, even when all listening services (Siri, etc.) are turned off. I'm skeptical -- here's a quick thread on why.
— Orin Kerr (@OrinKerr) April 9, 2019
Then CATO Institute Senior Fellow Julian Sanchez took the tech angle in another thread:
I think the technical grounds for skepticism are stronger than the legal ones. There are millions of smartphones in use. Monitoring network traffic is not all that hard; many thousands of nerds are doing it. A regular outgoing audio stream would be really, really hard to hide. https://t.co/lfoVMuLTSq
— Julian Sanchez (@normative) April 9, 2019
The bottom line, Sanchez says: It just doesn't make any economic sense for the companies to do it. (Even if it were legal, which it's not).
A point maybe not widely enough appreciated: Security is ultimately economics. The relevant question isn’t whether a system is perfectly secured against an attacker with infinite resources (no, never)—it’s whether breach costs more than the assets you're protecting. https://t.co/179UB7pNjd
— Julian Sanchez (@normative) April 9, 2019

Source: The Washington Post 

No comments:

Post a Comment