The Science of Hiring and Retaining Female Cybersecurity Engineers
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the latest insights and strategies for recruiting and retaining women in cybersecurity engineering through this 50-minute Black Hat conference talk. Delve into updated wisdom on industry challenges, successful approaches, and findings from a recent working group on acquiring and retaining female technology leaders. Examine current statistics, barriers, and discrimination forms affecting women in the field. Analyze the cybersecurity pay gap, debunk common misconceptions, and understand the three main areas blocking women's advancement. Learn about effective strategies throughout the applicant lifecycle, including job descriptions and affinity groups. Investigate reasons behind women leaving the industry, such as marriage and motherhood. Gain practical knowledge on implementing a framework for equal rewards, recognition, and promotion to create a more inclusive cybersecurity workforce.
Syllabus
Intro
Agenda
What do women want
Violence in games
People are individuals
Studies
Sources
Pipeline Stats
BLS Data
Professional Associations
Employment Stats
Global Information Security Workforce
Retention Data
Turnover Data
Why are women underrepresented
Top 5 barriers experienced by women
Forms of discrimination experienced by women
Cybersecurity pay gap
Some not science
Female only classes
Female only environments
Women dont get into cybersecurity
Three main areas where women are blocked
The applicant lifecycle
Affinity groups
Job descriptions
Splunk
What you provide
Why do women leave
Marriage and motherhood
The Framework
Stakeholders
End Goal
Sample Questions
Equal Rewards and Recognition
Promotion
Stock Photos
Unfavorable Factors
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network