Issue 10

Page 64

HOW DO WE ATTRACT WOMEN INTO CYBERSECURITY, AND RETAIN THEM? by Michelle Gatsi, Cyber Security Consultant at EY Kavika Singhal, Cyber Security Consultant at EY Jay Hira, Director of Cyber Transformation at EY Emily Goodman, Cyber Security Consultant at EY Shinesa Cambric, Principal Product Manager, Microsoft Intelligent Protections - Emerging Identity at Microsoft INTRODUCTION

Michelle Gatsi As the daughter of an automotive technician I grew up around a lot of cars. From kindergarten through to grade three my father would pick me up from school and take me back to his workshop where I would often watch him fix cars (from a safe distance of course) until it was time for us to go home. Virtually all my toys at home were model cars. My fascination

directed at boys, whilst the Barbie and My Little Pony

with these cars was not with driving them but with

commercials were directed towards young girls. I

understanding what made them move; I would

sometimes wonder, had I received the same push

deconstruct out of curiosity. Typically, the same

to consider a STEM-based career as a young boy

behaviours in young boys would be praised and

showing the same interests as I, would I have entered

perhaps even followed with remarks along the lines of

the cybersecurity industry sooner than I did?

“He is going to be an engineer one day, or a scientist.” I got together with some friends in the tech

64

At the time, my interests were not widely considered

industry—Kavika Singhal, Jay Hira, Emily Goodman

the ‘stereotypical feminine interests’. You may

and Shinesa Cambric—to ask some questions and

remember the television commercials for the

discuss the issues around attracting women into the

iconic Hot Wheels Racetrack: they were typically

cybersecurity industry and retaining them.

W O M E N I N S E C U R I T Y M A G A Z I N E

S E P T E M B E R • O C T O B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Lessons from the AWSN Leader Forums

3min
pages 116-117

your compass

2min
pages 114-115

The evolution of CREST

3min
pages 112-113

A camel is a horse designed by committee: achieving genuine collaboration in cybersecurity

6min
pages 104-107

Bayanihan for International Women’s Day

4min
pages 96-97

Improving security together

2min
pages 102-103

Talking privacy

6min
pages 92-95

Entering the cyber world at a more mature age

14min
pages 80-87

Transposing consumer partnerships from the bedside to the client meeting

4min
pages 78-79

Every voice deserves to be heard

15min
pages 72-77

Relationships: essential for career success

6min
pages 68-71

How do we attract women into cybersecurity, and retain them?

7min
pages 64-67

Should you take your teen’s device as punishment?

22min
pages 60-63

working parents

7min
pages 56-59

The education question

3min
pages 54-55

Cybersecurity: it’s a hybrid team sport

4min
pages 52-53

We are all just bricks

2min
pages 46-47

Aicha Bouichou

3min
pages 44-45

Parul Mittal

11min
pages 38-43

Sarah Box

5min
pages 36-37

Angela Hall

3min
pages 20-21

Monica Zhu

7min
pages 30-33

Aastha Sahni

4min
pages 22-23

Sarah Gilbert

5min
pages 34-35

Pooja Shimpi

7min
pages 26-29

to fighting cybercrime

1min
pages 14-15

Gabe Marzano

3min
pages 24-25

Aparna Sundararajan

7min
pages 16-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.