Women in Tech: The Anatomy of a Female Cybersecurity Leader

Learn more about the powerful women in tech as we look at a breakdown of today's female cybersecurity leaders! 
Michael Buckbee
1 min read
Last updated October 14, 2022

Cybersecurity has a gender gap.

According to the 2017 Women in Cybersecurity study, a joint venture between the Center for Cyber Safety and Education and the Executive Women’s Forum on Information Security, women only make up 11 percent of the total cybersecurity workforce.

In addition to occupying a substantially small space in a massive global industry, the few women who are in cybersecurity hold fewer positions of authority and earn a lower annual salary than their male counterparts, on average.

Many think pieces have mused about the causes of the gender gap in cybersecurity, with theories ranging from industry discrimination to socialization differences. It’s a pipeline problem and a retention problem: while there are now more programs designed to encourage girls to get into tech, it remains a difficult field for young women to enter — and stay in.

With the worldwide deficit of qualified cybersecurity professionals projected to reach 3.5 million by 2021, one thing is clear: Cybersecurity needs more women.

So, what does it take to be a leader in an industry notorious for its lack of gender diversity? In an effort to answer this question, we analyzed the current Fortune 500 list to see which companies have female leaders in their top cybersecurity position, including the chief information security officer (CISO), chief information officer (CIO) or VP of information security. Out of the 500 companies we examined, only 13 percent — or 65 companies — had a women working as the corporation’s cybersecurity leader in one of these positions.

Who are these 65 women? Check out the full infographic below to learn more about the women leading the way in cybersecurity.

 

While the gender gap in cybersecurity remains a real issue, these women — and their contributions to the world of cybersecurity — are paving the way for more gender inclusion in the future.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

speed-data:-protecting-private-healthcare-data-with-doug-cox
Speed Data: Protecting Private Healthcare Data With Doug Cox
The Salesforce leader emphasizes the importance of securing sensitive healthcare data
solving-the-cybersecurity-skills-shortage-within-your-organization
Solving The Cybersecurity Skills Shortage Within Your Organization
As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business
speed-data:-preparing-for-the-unknown-in-cybersecurity-with-ian-hill
Speed Data: Preparing for the Unknown in Cybersecurity With Ian Hill
Ian Hill, the Director of Information and Cybersecurity for Upp Telecommunications, offers his take on AI and the future of tech, shares his tricks for a good cyber defense, and explains why the best-laid plans of mice and security professionals often go astray.
speed-data:-thinking-from-a-cyberattacker's-perspective-with-dalal-alharthi
Speed Data: Thinking From a Cyberattacker's Perspective With Dalal Alharthi
Dr. Dalal Alharthi talks about the importance of organizations anticipating a breach and seeing the world through the eyes of an attacker.