logo

Why Do You Need a Cybersecurity Diversity and Inclusion Program?

Posted by Marbenz Antonio on April 19, 2022

For corporations and organizations, this is a period of significant change. This involves moving to the cloud and becoming a digital-first company. As a result, cybersecurity has become a top priority for many businesses and sectors.

It’s easy to get caught up in the tools and technology while discussing security. After all, we rely on them to keep our apps, data, and infrastructure safe. And when we do talk about individuals, it’s usually in terms of their abilities. We occasionally concentrate on how workers’ bad cyber behaviors lead to hacks and the necessity for continual cybersecurity training.

A team of people, however, is at the heart of all cybersecurity plans and activities. They collaborate to create the procedures and strategies. In other words, humans are at the center of the greater digital transformation as well as the accompanying digital security activities. Furthermore, many cybersecurity talks miss the value of assembling a diverse and inclusive staff.

Why Should Cybersecurity Have a Diversity and Inclusion Program?

We chatted with IBM’s Dimple Ahluwalia, VP, and managing partner, security consulting and systems integration, to learn more about why a Diversity & Inclusion (D&I) strategy is vital to an organization’s success in terms of staff retention and cybersecurity efficacy. She discusses how, to enhance diversity and inclusion in the cybersecurity business, we need to broaden our perspective on recruitment and hiring.

Q: Why is it critical to have a diverse cybersecurity team?

A: Problem-solving is the first step in ensuring cyber security. People evaluate circumstances differently depending on their viewpoints. For example, if we’re attempting to prevent social engineering, we’ll need people with a wide range of experiences and perspectives to look at the problem from multiple perspectives and figure out what we’re missing. Different people may understand and express information in different ways. Having a good communicator on the team may assist convert technical information into words that employees and executives can grasp. This can assist drive desired objectives, such as strengthening cybersecurity posture, by providing greater knowledge of an organization’s security concerns.

Neurodiversity is also necessary since different brains think in various ways. Some people are born with the capacity to see patterns in seemingly unconnected data that may indicate data breaches. Others are more detail-oriented, which might be useful for reviewing application test cases. Having security team members with specific expertise may give additional insights and correlations that corroborate findings and might assist in further refining automated systems.

We need to get back to focusing on people’s strengths. Cyberspace is about more than simply technology. People, procedures, and technology are all involved. The people aspect is huge. The process is critical, which is ensuring that individuals are engaged and are capable of thinking through circumstances sequentially or how things will be impacted. Technical abilities are valuable and useful, but they can be learned with time and effort. We shouldn’t limit ourselves to simply recruiting people with advanced technical training.

Q: What is the first move that the cybersecurity industry as a whole should do to increase overall diversity and inclusion?

A: To begin, we must broaden the applicant pool to include a far larger number of potential cybersecurity specialists. We need to take advantage of the fact that we can attract people who don’t have a four-year college diploma in the cybersecurity profession. We believe we need to continue with conventional initiatives, such as introducing cybersecurity curriculums in schools, helping students identify and engage in practical possibilities, and giving apprenticeships. However, we must go even farther, particularly in terms of tests that assist people in determining what possibilities are accessible and how their abilities translate.

As a group, we must abandon the notion that new cybersecurity personnel must fall neatly into one of two categories. We must begin to think beyond the box and search for raw, untapped ability in some settings. For example, I recently spoke with a customer that states that no one without a bachelor’s degree is permitted to work for them. These highly particular criteria, along with closed-minded thinking, maybe lose the company a significant amount of talent. I also worked with a professional who developed unique danger hunting talents while serving in the military for numerous tours.

When he left the military, he was told by transitional services that he should work in hospitality as a waiter. He was fortunate in that he rejected that advice and applied to an IT firm that took a risk on him. He later served on their internal threat team.

We need to figure out how to spot and develop talent from unusual domains. We need to look beyond the roles we need to fill today and be more open-minded to fill the roles of the future.

Q: What suggestions do you have for enhancing D&I efforts?

A: D&I begins by questioning how the organization operates. Many leaders desire to explore D&I but don’t know where to start, let alone how to convince others. We need the cybersecurity business to increase the effort to fulfill the interest of those who wish to pursue a career in the field. We need to assist people in making use of the resources available to them.

We must consider how we might push the envelope even further to decrease the skills deficit. I’m not saying that we recruit people who lack the necessary qualifications for the job, but many cybersecurity positions require more practical experience gained on the job than a four-year — or even a two-year — degree. With its ‘New Collar’ strategy, which is backed up by SkillsBuild and Digital Badging, and believe IBM is on the right route.

While we all have a responsibility to serve our respective businesses, as an industry, we can do more by examining current options for enterprises to join forces or platforms to facilitate collaboration. Not just inside our firm, but throughout the industry, we need to think about how to enhance D&I.

IBM SkillsBuild, for example, was designed not merely to teach future IBM employees, but to assist enhance the IT workforce as a whole. Individuals who use SkillsBuild frequently move on to employment in cybersecurity and other IT industries that they would not have been able to pursue without the knowledge and support provided by the program.

It’s not only about not competing for the same resources; it’s also about partnering to generate new ideas, increase the talent pool, and approach things in fresh ways. We believe our opponents are significantly more inventive in how they evaluate potential early on, focusing on tendency rather than formal schooling.

 


Here at CourseMonster, we know how hard it may be to find the right time and funds for training. We provide effective training programs that enable you to select the training option that best meets the demands of your company.

For more information, please get in touch with one of our course advisers today or contact us at training@coursemonster.com

Verified by MonsterInsights