Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

2/16/2021
10:00 AM
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Black History Month 2021: Time to Talk Diversity and Cybersecurity

In an industry that consistently needs new ideas, it's essential to have individuals who think, speak, and act in diverse ways.

For a long time in Silicon Valley, the conversations around diversity were limited to water-cooler talk and whispers. Organizations would wear inclusion as a badge on a website or as copy in a job description but fail to take steps toward permanent change. The murders of George Floyd and Breonna Taylor and the protests that followed created a ripple effect throughout the world and brought racial justice issues to the forefront of different sectors, including cybersecurity. 

The wakeup call was much needed. According to the US Bureau of Labor, people of color make up less than 20% of the information security analyst jobs in the country. In an industry that consistently requires new ideas to spark positive change and stand out against the status quo, it is necessary to have individuals who think, speak, and act in diverse ways. Otherwise, organizations who echo these statistics risk limiting their competitive advantages, product innovation, and ultimately their chances at successfully stopping cyber adversaries.

Related Content:

Our Diversity Program Isn't Working. What Are We Doing Wrong?

Special Report: How IT Security Organizations are Attacking the Cybersecurity Problem

New From The Edge: Unemployment Fraud: As If Being Out of Work Wasn't Bad Enough

Now more than ever before, the entire cybersecurity industry must commit to improving representation and equality for people of all races, ethnicities, genders, and orientations. Below, I have outlined key steps organizations must take to get started.

Start at the Top
The conversation about diversity needs to start at the top. CEOs and other high-level executives need to take a hard look at the people they have at the decision-making table. If they don't have people of color helping to drive strategy for the company, how are they supposed to make changes for those people?

When looking for a job, the first thing most candidates do is research the leadership team on the company website. Potential employees want to know who is making the decisions. If a candidate is a woman of color, for instance, and the leadership team is all white males, she might just see people who may not value her culture or her decisions. A lot of companies overlook this important step. The candidate could be well-qualified and a great fit for the position but still decide not to apply.

From its inception, a cybersecurity company must look to have people of color at the decision-making table. If the company is already established, HR should recruit so that people of all races are represented. To get there, it starts with executives taking a hard look at the unconscious biases around them and having the difficult conversations. By starting at the top, organizations can create a culture of equality.

Provide Opportunities for People of Color
For organizations looking to improve representation, the entire hiring process must be rethought. Leadership needs to provide opportunities for people of color. HR teams and company recruiters should be working together to conduct outreach, not just to underrepresented groups, but also companies who already have initiatives in place. What are other organizations that are successful at diversity and inclusion efforts doing that your company isn't? Are you consistently going back to the same talent pools for new positions? Look at the makeup of the company and reach out to anyone who might be underrepresented.

Companies can also find and research groups that are helping to encourage representation in STEM online, then support them. Women and people of color already in the company should also be advocating to open the doors for others.

Organizations must also look past traditional backgrounds. Cybersecurity teams have been critically understaffed for years. Hiring outside of traditional backgrounds and adding diversity to teams is a way to address the talent gap. Before entering the cybersecurity field, I was working in politics. Where security organizations saw a product, I saw a person. Many of my previous skills did transfer over and have guided me through the ebbs and flows of cybersecurity throughout the past few years.

Commit to Continued Conversation
Despite the deaths of George Floyd and Breonna Taylor shining a spotlight on racial injustices in the US in the summer of 2020, the Black Lives Matter movement has been going strong for years. When devastating events occur, such as the murders last summer, the conversation of inclusion is brought up only to be quelled a few weeks later.

For us to make a lasting impact on the cybersecurity industry, this is one of the most important things to change. Racial injustices have plagued our country for years, so to look to the future of the industry and make strides in diversity, we must commit ourselves to continuing to discuss equality and inclusion, no matter what is going on in the news.

The cybersecurity industry has one enemy: the digital adversary or cybercriminal. Uniting people of all colors, creeds, and genders under a common cause just improves the security posture for all by promoting different ideas and discussions. This can lead to new innovations and approaches in combating cyber-risk. 

Whether or not it is Black History Month, Black people, and people of color, must be celebrated, recognized for their achievements, given opportunity, and treated equally in the cybersecurity industry. By starting at the top, broadening recruiting efforts and committing to continued conversation, the cybersecurity industry can achieve equality once and for all.

LaChristian leads executive operations at Exabeam. She also leads the Exabeam CommUNITY Council, established to promote diversity and inclusion within Exabeam and the community at large. Before pivoting to her current role in the cybersecurity industry, LaChristian began her ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Frank Sterle Jr.
50%
50%
Frank Sterle Jr.,
User Rank: Apprentice
2/16/2021 | 4:42:15 PM
Black History Month and my own life
Fortunately, at a very young age I was emphatically told by my mother (who's of Eastern European heritage) about the exceptionally kind and caring nature of our Black family doctor. She never had anything disdainful to say about people of color; in fact she loves to watch/listen to the Middle Eastern and Indian subcontinental dancers and musicians on the multicultural channels.

Conversely, if she'd told me the opposite about the doctor, I could've aged while blindly linking his color with an unjustly cynical view of him and all Black people.

When angry, my (late) father occasionally expressed displeasure with Anglo immigrants, largely due to his own experiences with bigotry as a new Canadian citizen in the 1950s and '60s.

He, who also emigrated from Eastern Europe, didn't resent non-white immigrants, for he realized they had things at least as bad. Plus he noticed—as I also now do—in them an admirable absence of a sense of entitlement.

Therefore, essentially by chance, I reached adulthood unstricken by uncontrolled feelings of racial contempt seeking expression.

Not as lucky, some people—who may now be in an armed authority capacity—were raised with a distrust or blind dislike of other racial groups.

Regardless, the first step towards changing our irrationally biased thinking is our awareness of it and its origin.

But until then, ugly sentiments need to be either suppressed or professionally dealt with, especially when considering the mentality is easily inflamed by anger.
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24913
PUBLISHED: 2021-03-04
A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.
CVE-2020-24914
PUBLISHED: 2021-03-04
A PHP object injection bug in profile.php in qcubed (all versions including 3.1.1) unserializes the untrusted data of the POST-variable "strProfileData" and allows an unauthenticated attacker to execute code via a crafted POST request.
CVE-2020-24036
PUBLISHED: 2021-03-04
PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code.
CVE-2020-24912
PUBLISHED: 2021-03-04
A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.
CVE-2019-18629
PUBLISHED: 2021-03-04
Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a com...