Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Women in Tech: The Anatomy of a Female Cybersecurity Leader

1 min read
Published April 10, 2018
Last updated October 14, 2022

Cybersecurity has a gender gap.

According to the 2017 Women in Cybersecurity study, a joint venture between the Center for Cyber Safety and Education and the Executive Women’s Forum on Information Security, women only make up 11 percent of the total cybersecurity workforce.

In addition to occupying a substantially small space in a massive global industry, the few women who are in cybersecurity hold fewer positions of authority and earn a lower annual salary than their male counterparts, on average.

Many think pieces have mused about the causes of the gender gap in cybersecurity, with theories ranging from industry discrimination to socialization differences. It’s a pipeline problem and a retention problem: while there are now more programs designed to encourage girls to get into tech, it remains a difficult field for young women to enter — and stay in.

With the worldwide deficit of qualified cybersecurity professionals projected to reach 3.5 million by 2021, one thing is clear: Cybersecurity needs more women.

So, what does it take to be a leader in an industry notorious for its lack of gender diversity? In an effort to answer this question, we analyzed the current Fortune 500 list to see which companies have female leaders in their top cybersecurity position, including the chief information security officer (CISO), chief information officer (CIO) or VP of information security. Out of the 500 companies we examined, only 13 percent — or 65 companies — had a women working as the corporation’s cybersecurity leader in one of these positions.

Who are these 65 women? Check out the full infographic below to learn more about the women leading the way in cybersecurity.

 

While the gender gap in cybersecurity remains a real issue, these women — and their contributions to the world of cybersecurity — are paving the way for more gender inclusion in the future.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
speed-data: why-cybersecurity-is-an-unceasing-progression-with-siwar-el-assad
Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad
Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.
dspm-deep-dive:-debunking-data-security-myths
DSPM Deep Dive: Debunking Data Security Myths
DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.
speed-data:-rethinking-traditional-cybersecurity-principles-with-rick-howard
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
the-benefits-of-threat-and-data-breach-reports
The Benefits of Threat and Data Breach Reports
Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.