{"id":12125,"date":"2018-10-19T13:55:10","date_gmt":"2018-10-19T09:55:10","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=12125"},"modified":"2019-11-15T15:22:46","modified_gmt":"2019-11-15T11:22:46","slug":"cyberstarts-boston-2018","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cyberstarts-boston-2018\/12125\/","title":{"rendered":"Kaspersky Lab&#8217;s CyberStarts Boston"},"content":{"rendered":"<p>Eleven percent isn\u2019t nothing \u2014 you wouldn\u2019t brush off an 11% risk of injury or cyberincident \u2014 but when it comes to representation in the workplace, being in the 11% can be daunting. And 11% is women\u2019s representation in the world of cybersecurity.<\/p>\n<p>Considering that cybersecurity faces an alarming shortage of talented workers, you might think the solution is simple: help get girls interested in tech. As it turns out, reality is a lot more complex. For starters, getting girls interested isn\u2019t a problem. Complex problems appeal to us at Kaspersky Lab, though, and so we continued our exploration with a daylong conference called CyberStarts.<\/p>\n<p>As our <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/Kaspersky\/videos\/2187681874822343\/\" rel=\"noopener noreferrer nofollow\">first keynote<\/a> speaker, <a target=\"_blank\" href=\"https:\/\/twitter.com\/evacide\" rel=\"noopener noreferrer nofollow\">Eva Galperin<\/a>, pointed out, being in the 11% means that in a room of 10 developers, she\u2019s the only woman. In a smaller meeting, it\u2019s a fair bet no women are there.<\/p>\n<p>The downsides affect the women in question in some obvious ways, and they are also to the detriment of the industry; and the world it serves.<\/p>\n<p>As in cybersecurity, identifying a problem is followed by poking at potential solutions to figure out what has and hasn\u2019t worked in the past, what\u2019s working now, and what else to try next.<\/p>\n<h2>Good morning: The first step is admitting you have a problem<\/h2>\n<p>It\u2019s a terrible and sad fact that every woman on the planet has war stories covering the gamut from having ideas and family needs discounted at work to sexual assault in the workplace or at industry conferences. We are still in an era in which those stories must be spoken out loud, for reasons every bit as broad as the stories themselves. To begin with, when the men in the boardroom think they\u2019ve helped by making a directive to consider woman applicants equally, actual hiring processes may not bear that out, and women may surprise them by pointing out the continuing need for inclusive codes of conduct and other policies. More on that in the next section.<\/p>\n<p>From the morning keynote \u2014 by the Electronic Frontier Foundation\u2019s director of cybersecurity, Eva Galperin \u2014 the conference segued into a panel discussion featuring Kasha Gauthier, from the Advanced Cyber Security Center, Sara Munzinger of Carbon Black and Lesbians Who Tech, and Pam Stenson, from Alta Associates and the Executive Women\u2019s Forum. Both sessions circled around themes of girls and women becoming interested in tech, overcoming discouragement to enter the field, and persevering.<\/p>\n<p>To sum up the apparently universal problems:<\/p>\n<ul>\n<li>Women new to cybersecurity jobs find themselves in the minority<\/li>\n<li>New women in tech \u2014 also known as former teenage girls \u2014 are exceptionally vulnerable and likely carry strong memories of having little control over their technological lives and simultaneously being attacked technologically (e.g., hacked or phished) and\/or socially through their tech usage (e.g., cyberbullying)<\/li>\n<li>They may be overlooked (sometimes literally) in meetings and at industry conferences<\/li>\n<li>They may be subject to sexual harassment or assault in the workplace or at industry conferences<\/li>\n<li>Like their male counterparts, they would benefit and feel more like productive contributors with mentor\u2013mentee relationships, but with so little female representation, mentors are hard to come by<\/li>\n<\/ul>\n<h3>How diversity benefits us all<\/h3>\n<p>Is it actually a problem that the industry is full of men? If girls were more interested in cybertech, or better suited to it, they\u2019d be in cybertech, wouldn\u2019t they?<\/p>\n<p>Well, no. Certainly not according to the CyberStarts morning crew, who pointed out that women tend to be well-suited to high-tech jobs (<a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/closing-gender-gap-cybersec\/20053\/\" rel=\"noopener noreferrer nofollow\">our research agrees<\/a>). On the panel, Munzinger and Stenson briefly described how cybertech\u2019s rich field of opportunity attracted them from other and adjacent fields. And Gauthier added some of the ways in which she sees women as naturally suited to the field: \u201cWomen are natural problem-solvers; we\u2019re natural collaborators; we\u2019re natural question-askers and envelope-pushers in many ways\u2026.Infosec really needs those skills.\u201d<\/p>\n<p>The broad challenge, as they see it, is less that of attracting women to the field (i.e., having a pipeline) and more that of retaining them (i.e., fixing the leaky pipeline).<\/p>\n<p>And why should the industry care? That\u2019s an easy one \u2013 <b><strong>the more voices, the better the results.<\/strong><\/b> A bunch of people with similar experiences, outlooks, and incomes tend to create projects and products that address their own needs, not necessarily the needs of everyone \u2014 and each person\u2019s experiences and ideas reinforce those of the others, creating an echo chamber.<\/p>\n<p>A group of men might not anticipate the needs of many mothers to feed their families at the end of the workday, for example, or why products for women\u2019s health would have any appeal. A group of middle-class folks might unthinkingly locate an office in a spot not served by public transportation or some well-meaning men, thinking hard, might create a <a target=\"_blank\" href=\"https:\/\/www.amazon.com\/BIC-Cristal-1-0mm-Black-MSLP16-Blk\/product-reviews\/B004F9QBE6\" rel=\"noopener noreferrer nofollow\">pen for women<\/a> and pat themselves on the back. Ask the inventors of various connected technologies about their motivations and expectations, and almost to a man, they didn\u2019t realize their creations might be used to do harm. Sit with that last one for a second.<\/p>\n<h3>Good afternoon: Moving the industry forward<\/h3>\n<p>Although it can be gratifying to share information and gripes about what\u2019s not yet right in our industry, at some point we are compelled to look toward the future \u2014 you know, the part where we save the world.<\/p>\n<p>To that end, our <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/Kaspersky\/videos\/548085775645089\/\" rel=\"noopener noreferrer nofollow\">afternoon keynote<\/a>, from BrainBabe founder and founder and CEO of CyberSN Deidre Diamond, directly addressed the pipeline: hiring and retaining diverse talent in cybersecurity.<\/p>\n<p>Although the personal and interpersonal elements of a workplace don\u2019t appear in standard budget worksheets, studies have shown that EQ (the emotion quotient) is in fact tied positively to revenue, Diamond pointed out. Her mission, therefore, is to help make healthy matches between talented people on both sides of the hiring desk. She looks at a range from the \u201ccyberobvious,\u201d such as in IT, to the really not obvious, such as in noncyber c-tier roles, and plenty in-between.<\/p>\n<h3>An ongoing, iterative process<\/h3>\n<p>Diamond, as well as the afternoon panel \u2014 on female leadership in the workforce \u2014 talked about methods of evening the hiring field, including blanking out the names atop r\u00e9sum\u00e9s. They, too, spoke of the need to <em>retain<\/em>, not simply hire, a diverse field of workers. Fifty percent of women who enter tech jobs leave within three years.<\/p>\n<p>To begin, they broadly agreed that \u201ceveryone hates [the concept of] the work\u2013life balance.\u201d Essentially, they pointed out, when women entered the workplace, they didn\u2019t leave their life responsibilities behind, and those responsibilities don\u2019t begin and end at 9 and 5 (or 8 and 6). Therefore, an inclusive workplace may need to reckon with flexible schedules, remote work, and needs a previously male-dominated space didn\u2019t anticipate, from the feeding a family at the end of the day to crafting respectful communications policies and codes of conduct.<\/p>\n<ul>\n<li>To respect religious (or nonreligious) diversity, use floating holidays<\/li>\n<li>Instead of requiring workers to enforce their own boundaries, craft work with boundaries<\/li>\n<li>Watch the results, not the clock<\/li>\n<\/ul>\n<p>SafetyPIN founder and CEO Jenny Thompson, part of the afternoon panel, noted as well that women in particular may need a path <em>back<\/em> to the workplace.<\/p>\n<p>Threatpost\u2019s <a target=\"_blank\" href=\"https:\/\/twitter.com\/lindseyod123\" rel=\"noopener noreferrer nofollow\">Lindsey O\u2019Donnell<\/a> moderated the afternoon panel, representing female leadership in the workforce, with Thompson, Prompt Inc. founder Hazel Butters, Alena Reva, Kaspersky Lab\u2019s vice president of Human Resources, and Addie Swartz, founder and CEO of reacHIRE.<\/p>\n<p>In addition to the abovementioned, somewhat general points about women successfully entering and navigating today\u2019s workplaces, they also spoke directly about cybertech work and careers. Rising and thriving in an admittedly male-dominated industry does have certain challenges, such as proving oneself in areas where women\u2019s competence is still very specifically questioned.<\/p>\n<p>Before closing the conference, the leadership panel offered some cybertech-savvy tidbits:<\/p>\n<ul>\n<li>Especially when you\u2019re the only woman, or in a tiny minority: Pick your battles<\/li>\n<li>Watch and learn from women who are making it, sticking with cybertech jobs against the odds<\/li>\n<li>Be mentally prepared to be in the minority in cybertech, and don\u2019t be afraid not to fit in<\/li>\n<li>Get advice from HR when you need it, and remember that you\u2019re in demand<\/li>\n<li>Relish being unique<\/li>\n<li>Be inclusive, and don\u2019t reject the ideas and knowledge of established players \u2014 diversity includes everyone<\/li>\n<li>You\u2019re going to have to be better. You just are. But the good news is, we are.<\/li>\n<\/ul>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/SB1Z6IL1-4I?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our daylong conference aimed to empower the next generation of cybersecurity professionals.<\/p>\n","protected":false},"author":2045,"featured_media":12126,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1485],"tags":[1518,1901,1942,1697,1748,352,1700],"class_list":{"0":"post-12125","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-awareness","9":"tag-career","10":"tag-cyberstarts","11":"tag-gender-equality","12":"tag-jobs","13":"tag-kaspersky-lab","14":"tag-women"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberstarts-boston-2018\/12125\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberstarts-boston-2018\/14501\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberstarts-boston-2018\/16432\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberstarts-boston-2018\/14629\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberstarts-boston-2018\/13576\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberstarts-boston-2018\/17225\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberstarts-boston-2018\/16503\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberstarts-boston-2018\/24256\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cyberstarts-boston-2018\/9922\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberstarts-boston-2018\/17976\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberstarts-boston-2018\/21844\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberstarts-boston-2018\/21378\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberstarts-boston-2018\/21383\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/awareness\/","name":"awareness"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2045"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12125"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12125\/revisions"}],"predecessor-version":[{"id":14581,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12125\/revisions\/14581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12126"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}