• About
  • Subscribe
  • Contact
Friday, March 24, 2023
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result

PodChats for FutureCISO: Narrowing the cybersecurity gender leadership gap

Allan Tan by Allan Tan
February 8, 2023

A Cybersecurity Ventures report, Women in Cybersecurity 2022, estimates that women held about 25% of cybersecurity roles globally, up from 20% in 2019 or 10% in 2013.

The forecast looks promising with estimates that by 2025, women will hold 30% of cybersecurity roles and 35% by 2031. So, there is some progress. However, given the long road ahead, how should we prepare the current generation of women aspiring for a role in cybersecurity not just to enter the profession but also to prosper and become the leaders they are meant to be?

Mel Migriño, chairman and president of the Women in Security Alliance Philippines, describes the efforts of WiSAP as working to educate and mentor women from different areas of technology, cybersecurity and even risk management. “WiSAP doesn’t only support the progression of female leaders. We also support gender equality,” she said adding that diversity is a core aspect of the organisation.

The Women in Security Alliance Philippines Board

“They don’t remain constant in what they know and in what they do,” Migriño says a common attribute of some of the best cybersecurity specialists, irrespective of gender. “They evolve faster. They listen. They accept change and they are not afraid to commit mistakes as these are lessons that will make them better in what they do.”

She concedes that the proportion of women representation across the business, technology, cybersecurity, and risk management is growing.

“I believe the stake of women in technology and in business is becoming more imminent until it reaches a stage where we can no longer distinguish the difference in the work environment,” she opines.

Mel Migriño

“Especially in the field of cybersecurity, when adversaries are practically growing, we need all the resources that we can get, and this includes both men and women working together for a common good. Of course, the ideal goal is always to achieve that parity as far as, the roles are concerned.”

Mel Migriño

She acknowledges that in some areas of practice, for example, the 24x7 work of some functions like security administration, platform administration, platform security administration, and security operations centre, there is a natural inclination to assign tasks to male professionals.

“Regardless of gender, what should be the greater focus is what one can do, and how one can deliver to achieve better results,” she continues.

Where the journey begins

Migriño concedes that efforts have been underway at schools in the Philippines to introduce courses that introduce elements of cybersecurity, in part to augment the gap observed among new entrants to the workforce.

She is appreciative of the impact sustainability initiatives are having in driving for greater inclusion. She beckons women, particularly those just starting and those in middle management to leverage the opportunity to get the training and experience to become leaders in technology.

Asked about what ethics need to be developed in the pursuit of a cybersecurity profession, Migriño suggested that technical skills are always given. “They should have an appetite for continuous learning including technologies, standards, frameworks, and principles, in supporting enterprise IT and operational technology,” she adds.

One point she feels is important for those aspiring to a career in cybersecurity is to learn and understand the language of business language. Doing so will enable them to make proposals that businesspeople can appreciate and implement.

“Lastly, cyber is not just a profession. It is a 24-by-seven commitment – not a five-day-a-week career,” she opines.

She cautions that pursuing a cybersecurity career carries personal risks. Families will need to accept the demands of the work, in addition to the good that the job does for society. “There is a commitment to integrity,” she adds.

According to Migriño, a career in cybersecurity means accepting that it is most often working in the background. “Cybersecurity is a vocation and as such you do not expect yourself to be in the limelight – except in the event of an incident,” she concludes.

Click on the PodChat player and hear Migriño’s take for those pursuing a career in cybersecurity in general and the career path for women in cybersecurity.
  1. What is Women in Security Alliance Philippines all about?
  2. Having met cybersecurity leaders such as yourself, what one characteristic is common to some of the best cybersecurity specialists you know?
  3. What is your view of women’s representation in the cybersecurity space?
  4. What is driving this inequality in representation in the cybersecurity space?
  5. What needs to happen to encourage greater participation of women in the cybersecurity space?
  6. For women aspiring to enter the security space, what characteristics must they hone, qualifications do they need to build?
  7. What personal risks should those interested in pursuing a CISO career keep in mind?
  8. Any advice for those interested to pursue a career in cybersecurity?
Related:  IDC: China-US trade war no impact to commercial ICT investments
Tags: cybersecurity professionalsgender equalityPodchatsWiSAP
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates and speaks at events. He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hilll+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippine. Other sales roles include Encore Computer and First International Computer. He was a senior industry analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a network specialist and later Head of IT at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Sophos: ChatGPT can help fight malicious threats
  • SAP Datasphere preserves context of business data
  • Collaboration and culture: keys to DevSecOps success
  • HPE buys OpsRamp to boost GreenLake’s capabilities
  • The Defender's Advantage: a guide to activating cyber defence

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Education
  • Finance
  • Finance & Insurance
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In