Company
Title
Fortune 500 Rank
Biographical Info
City
State
A small college in Claremont, CA may have finally found the formula to start attracting more women into Cybersecurity careers.
Women may be a key factor to bridging the gap in the cybersecurity field where there is such a severe labor shortage. There are one million cybersecurity job openings in 2018. More than 209,000 cybersecurity jobs in the U.S. are unfilled, and postings are up 74% over the past five years, according to an analysis of numbers from the Bureau of Labor Statistics by Peninsula Press, a project of the Stanford University Journalism Program.
Michael Brown, the CEO of the world’s largest security software vendor, Symantec, claims the demand for cybersecurity talent is expected to rise to 6 million globally by 2019, with a projected shortfall of 1.5 million.
Today, only 11% of cybersecurity positions are filled by women, according to the Women’s Society of Cyberjutsu (WSC) which is a non-profit that empowers women to succeed in the Cybersecurity field, This is in stark contrast with most other professional fields where women make up almost 50% or sometimes more of the workforce.
Across the nation, women only make up less than 16% of all graduating computer science majors and less than 12% of graduating computer engineering majors according to the Computing Research Association.
Not so at Harvey Mudd College, where they have cracked the code to attract women into computer science degrees. More than half — 55% — of the latest class of computer science graduates were women, compared with roughly 10 percent a decade ago.
In fact, programming is becoming so popular at Harvey Mudd, which is a part of Claremont Colleges, that its professors are campus celebrities and incoming freshmen are excited for classes before ever setting foot on campus.
The professors at Harvey Mudd College may have found the right formula which could be translated to the cybersecurity industry.
Using student feedback, observations from class and a bit of creative social psychology, professors identified three key reasons female students did not major in computer science:
They were intimidated by it the topic and the culture, and
It did not have social relevance.
Maria Klawe, Harvey Mudd’s president since 2006 and a computer scientist herself, used her influence in making the field more attractive to women and has been a nationally recognized speaker on creating more diversity in the STEM Workforce.
“Building confidence and a sense of belonging and a sense of community among these women makes such a huge difference,” she said. “Once you change the myths and the cultural beliefs about computer science, that has a lot of momentum.”
Here are some key changes the program introduced to help attract more women into Computer Science:
Gaming: Instead of having computer science students write arcane code, professors started giving them fun group puzzles and 3-D graphics to create their own games. They also used more language based projects such as writing algorithms that can recognize lines of Shakespeare, generating new text with similar sentence patterns and designing facial recognition programs.
Solving Real World Problems: Women, more often, want to know they are contributing to a bigger, worldly purpose, whereas, most males were focused on personal projects. Therefore, the curriculum was tuned to focus more on solving real world problems such as using algorithms to solve evolution questions, to analyze DNA sequences and to focus on disease research opportunities.
Collaboration Projects: More collaboration projects were introduced to take advantage of women’s strength in solving complex problems in teams. They revamped homework assignments to bring groups of students together to solve problems.
Created Mentorships: Professors found ways to remove the so-called macho effect by which more-experienced students — usually male — intimidated others by answering all the questions. They pulled those students aside and privately asked them to become mentors to the less experienced group which created a sense of value for them.
Individualized Training: The department customized the curriculum to align with each person prior experience, so that those who knew less were learning at their own pace specifically in the areas where they needed the most training.
Hired Diversity in Leadership: The college also purposely sought out and hired more female professors to attract more female students into the program.
While the classroom and a cybersecurity team may differ in many ways, applying some of these same techniques may open up the door to many women who would have not previously considered the security field as a career opportunity. Here are some tips which may be helpful:
Applying this to Cybersecurity:
Create a fun work environment: Life is too short to be stressed out all the time. Celebrate the successes whether it is finding a potential threat or going a month without an incident. Liven up meetings with appropriate humor. Create events to bring your team together such as sponsoring local meetups or getting the team to participate in ‘capture the flag’ contests.
Leverage Collaboration & Social Skills: Create opportunities to build a stronger social community within your group by solving complex problems in teams
Social Relevance: Help your team understand the greater purpose of protecting the company’s intellectual property, infrastructure and communications. Attend InfraGard meetings as a team to see how keeping threats out can contribute to our National security.
Reduce Intimidation: Create a work environment where the less technical are not intimidated by the “know-it-alls.” Enlist those team members to help elevate the knowledge of the less technical to elevate the capability of the entire team.
Personalized Training: Evaluate each individuals strengths and weaknesses and customize a training program for them. Whether it is formal outside training or pairing them up with a coworker, choose a path to ensure they are learning at an appropriate pace without intimidation.
Women Leadership: Purposely seek out female security leaders. Installing a women leader will naturally raise the level of confidence and comfort across the team for other women to join in.
Changing the negative stereotypes in cybersecurity may take some time, but with purposeful effort, women and other underrepresented demographic groups, can be attracted into security careers. This can help fill the employment gap and lead to greater opportunities and stronger teams by leveraging their strengths.
About Tim Howard
Tim Howard is the founder of four tech firms including two Executive Search Firms, Energy Sourcing (www.energysourcing.com) and Fortify Experts (www.fortifyexperts.com) which helps companies find exceptional “Embedded” talent through executive search, permanent placement, and project consultants.
Tim Howard is also a Certified Birkman Personality Coach which helps company’s develop High Performance Teams by increasing effective communication and reducing personal conflicts.
He has been leading technology staffing teams for over 15 years and is the founder of three other technology firms. He has degrees from Texas A&M University in Industrial Distribution and Marketing.
Invite me to connect: www.linkedin.com/in/timhoward
There are hundreds, if not thousands, of recruiters and search firms out there who want to recruit cybersecurity professionals for you. You probably receive multiple calls and emails per week looking for security “job orders” to work on.
Although I’ve been recruiting in the technology space for over 15 years and now in the cybersecurity space for about 3 years, I have found there are critical differences between the two areas. Therefore as a security leader, if you don’t qualify firms up front, you can waste a tremendous amount of your time and may not result in hiring the security expert you need on your staff.
As you know finding the right security talent is not an easy task. There are a lot of ‘wannabe security folks” out there who do not know their stuff and would require significant training which you may not have the time or resources to complete.
Therefore, here are some questions you should be asking any recruiter or search firm before you hire them to work on critical security roles:
Recruiting security experts is a very different process than hiring IT support or development personnel. Most recruiters rely heavily on LinkedIn and job boards such as Monster and Career Builder. Whereas, most good security professionals despise those platforms. Plus they will rarely ever respond to job postings. They know they are in high demand. If they want a new position, they most often leverage their security network.
Therefore, to be successful in a security search, recruiters much know this domain well and go back to ‘head hunting’ where they build long term trusted relationships and referral networks. Then when an appropriate role comes along, it is much easier to get a security professionals to raise their hand in interest. As I tell our recruiting team, “It’s not who’s looking for us, it’s who we are looking for.” That’s what leads to successful searches.
Author:
Tim Howard is the founder of Fortify Experts which helps companies find exceptional cybersecurity talent through executive search, permanent placement and project consultants. Howard has been leading technology staffing teams for over 15 years and is the founder of three other technology and staffing firms. He has degrees from Texas A&M University in Industrial Distribution and Marketing.
Here is a checklist that reviews some of the points discussed in this guideline. You can use it to prepare for an interview or as a starting point for creating your own interview, checklist. By following these guidelines, you can improve your interviewing techniques, evaluate candidates more effectively, and make better hiring decisions.
Before the interview:
During the interview
After the interview
Other Candidate Interviewing Resources:
Before you try to judge the compatibility of a candidate, you should articulate who you are as a company and what is required by the position you want to fill. This is an important task, yet many companies don’t take the time to define their values and expectations. If you don’t have a clearly articulated corporate culture, your recruiter can help you develop a profile that best describes the character of your organization. This profile will play an important part in your interviews. Once you’ve articulated the values that are important to your company, you can fashion interview questions that will uncover the qualities and characteristics that are consistent with those values.
It is also important to define the position and the role the candidate is expected to play in your company and to be aware of whether and how the job requirements vary from your company’s overall value system. For example, a company that thrives on an aggressive style may be looking for a manager who is expected to mediate conflict; this role will require conciliatory skills and a more soothing style than might be expected of other people in the company. Your recruiter can assist you in developing an accurate, detailed job description and an appropriate compensation package.
The biggest weakness in most interviews is the lack of clear interviewing goals.
What is the interviewer’s role?
Clearly define the purpose of the interview ahead of time. Know exactly where you want the interview to go, then gently lead the candidate there. Before going into any interview familiarize yourself with the candidate’s background and prepare an outline or a list of questions. Without doing both of these things, your interview can easily turn into an aimless, unproductive conversation.
When you’re interviewing a number of people for the same position, you should create a level playing field for the candidates and a standard for comparison for your final hiring decision. Ask the same kinds of questions and cover the same ground with each person. That way, when it’s time to sit down and evaluate your field of candidates, you’ll be comparing apples to apples.
Don’t write a script and recite it word-for word in each interview, because it’s important to allow for exploratory follow-up questions. Make a checklist that includes all the areas you want to cover with each candidate, review it before you go into the interview, then refer to it during your meeting, if necessary.
You get the best results when you break through the persona a candidate feels he/she has to project in an interview. Many candidates are nervous, many are trying to meet what they assume are your expectations, and all are trying to be in top form. To get as real a portrait of the candidate as you can, make him feel comfortable. Open the interview by trying to find some common ground — a shared alma mater, a city you’ve both lived in or visited, a mutual home state, or professional affiliations. Use this as an icebreaker, but don’t let the interview veer off into tales of your old fraternity. Try to create a connection, then lead the discussion to the issues at hand. Simply being friendly is an effective technique for making the candidate feel at ease. Being confrontational may show you how he responds in confrontational situations, but it won’t get you much farther than that. An interview shouldn’t be designed to test a candidate’s mettle.
An interview is a mutual evaluation; the impression you give the candidate will affect his opinion of the company as a whole and play an important role in his decision should you decide to make him an offer. So, show respect for the candidate by giving him your full attention. Don’t keep him waiting, and don’t take phone calls or allow interruptions during the interview. Treat him as a fellow professional.
You can jot down some notes during an interview to help you remember important information, but keep note taking to a minimum. It is difficult to listen and write at the same time, and you want to absorb and respond to what the candidate is saying. Also, by looking at the candidate rather than at your notepad, you give the impression that you’re really listening. As soon as the interview is over, make detailed notes about your impressions and the candidate’s responses. Your checklist will help you recall and organize the information. Don’t trust your memory: after three or four interviews, it could be impossible to remember distinguishing information about individual candidates without accurate notes.
One of the most common, and unreliable, factors in hiring decisions is the first impression. Choosing people on the basis of how much they look like us, how attractive they are, or how they strike us during the first few minutes or seconds of a conversation is not a good method of selection (If you were meeting with a potential client, would you let a poor first impression disqualify him as a potential long-term customer?). Just because you click with a candidate personally or find you have a lot in common, that’s not an indication of his suitability for the job. Although there’s no way to avoid your personal feelings in response to an individual, there is a way to deal with them: when you meet a candidate, quickly and privately acknowledge your initial reaction, then set it aside and get on with the interview.
Remember that an interview is a two-way, information-gathering event. It’s a meeting where both parties expect to learn something. Articulate your expectations clearly, and represent your company and the position as accurately as you can without revealing confidential or sensitive information. Leave room for questions, and be honest in answering them. Be upbeat and positive, even when giving what might seem like a tough answer. Don’t use the interview to vent your own dissatisfactions or discuss personal conflicts.
The early part of the interview should be geared toward determining the candidate’s professional qualifications, but you shouldn’t waste a lot of time having him reiterate facts already listed on paper. Use the resume as a guide to verify and qualify his experience.
Here are a couple of good questions to use early in the interview:
With the characteristics you’re looking for in mind, use open-ended questions to identify the traits of the candidate. “How” and “why” questions reveal a lot about the candidate’s experience, thought processes, and motivation. Open-ended questions can also be extremely useful in determining how well a candidate communicates their thoughts and matches your company’s value system. Be sure to avoid unfocused questions that allow for broad, abstract answers.
Here are some examples of good, probing questions:
If, after asking your key-qualifying question, you determine that the applicant is a viable candidate, you should be ready to start selling the position and your company. Typically, the person you are interviewing already has a satisfactory job; it is up to you and your company to make working for you more attractive.
When you reach this point in an interview, try saying something like this:
Your enthusiasm at this time will create excitement and encourage positive feelings that will be important if you decide to make an offer. Really good people are hard to find. Make sure good candidates leave the interview with the feeling that you and your company are truly interested in them as potential employees.
Quick Review Checklist
Here is a checklist that reviews some of the points discussed in this guideline. You can use it to prepare for an interview or as a starting point for creating your own interview, checklist. By following these guidelines, you can improve your interviewing techniques, evaluate candidates more effectively, and make better hiring decisions.
Before the interview:
During the interview
After the interview
Other Candidate Interviewing Resources:
Hiring Exceptional Talent is a skill and as with any skill it must be practiced and honed to become highly effective. Preparation is key. Before conducting your first interview, you need to do your homework. Here are several very important steps which need to be taken before you schedule the first interview:
To hire an exceptional candidate, you have to define what exceptional is in your mind. You need to take the time to write down this criteria. Don’t just ‘think’ about it – this needs to be clearly defined:
Imagine if you hired the perfect person, and a year from now you’re about to enthusiastically issue them a check for the maximum bonus they could earn:
From these accomplishments, find the common threat between them and narrow it down a list of 3 to 5 key success factors or attributes this person needs to have or achieve to be considered an exceptional hire.
Most hiring managers never take the time to define this step and allow interviews to wander all over the place. Defining this criteria up front will provide you with a strong interview foundation which will lead to better hires.
Look back at your success factors. What questions do you need to ask to uncover if a candidate can achieve those? Write down these questions. What experiences does a candidate need to have to prove they can do it again?
Questions like “Give me an example of how you ….” instead of “Do you have this skill?” are much more effective in understanding a candidates’ breath of experience. Questions like:
Interviews should be conversational but knowing these criteria and questions up front will allow you to intertwine them throughout the interview.
Too often, hiring managers, wait until the candidate sits down before they even start looking at the resume. Again, interview prep is critical to getting this right. Would you walk into a new client prospect without being prepared? Hiring an employee can have the same revenue effect. The wrong hire could cost you hundreds of thousands of dollars. The right hire can make you hundreds of thousands of dollars. Spend the 15 minutes prior to an interview to review and highlight areas which you need more information such as:
Most of the time candidates will come into an interview with stock answers and examples. It is your job to get beyond the stock answers. Follow up questions are critical in revealing a candidates motivations, attitude and aptitude. Ask follow up questions like:
When a candidate runs out of a stock answer, their true character comes out. When you feel you are getting a stock answer, don’t rush to move on, dig deeper to see what lies under it.
Hiring managers a notorious for ‘going with the flow’ of the conversation which makes comparing candidates very difficult. If you are truly trying to uncover an exceptional candidate, you must be methodically comparing them. Using the same basic format and questions simplifies the evaluation process.
Writing down how a candidate ranks against the predefined success criteria during and immediately after the interview process is critical. We often think we will remember the specifics around a candidate’s interview but often after multiple candidates are interviewed and weeks go by, those conversations all blend together.
Taking notes about how each candidate addresses each of your success criteria eases your mind and speeds up the hiring decision process.
By training yourself on how to be a better interviewer, will directly result in you making better hires enabling you to surround yourself with an exceptional team.
Other Candidate Interviewing Resources:
Have you heard that some companies are in effect ‘renting’ a temporary information security officer?
It’s not as crazy as it sounds.
While every organization needs an information security officer – to identify information threats and implement strategic and compliant security plans – not every company can afford to hire one full time.
Here are 9 reasons why an organization might consider hiring a virtual CISO.
The Frost & Sullivan study concluded that once you hire an information security officer, it’s still important to improve security awareness throughout the company. The most important methods: provide on-going employee training and embed security processes into the workplace.
This is why Fortify Experts’ vCISO program is one of the most effective ways to help reduce the risk of a security breach. Learn more about how to Fortify Experts can help protect your company.
It is well publicized that there is a critical shortage of trained cybersecurity talent in the workforce (Over 400,000 jobs with only 50,000 people to fill them). However the irony is – there is a constant stream of highly trained intelligence personnel coming out of our armed forces who are having a difficult time securing a decent job in the corporate world.
Although we may honor our veterans, are you willing to hire one even though they don’t have exactly the skills in your job description? I have spoken with many intelligence veterans or soon to be veterans who are frustrated with the lack of opportunity coming out of the military.
I contest that the military is an excellent source of cybersecurity talent as they work with highly secure and encrypted communications, intelligence systems and networks and, top secret data. When their information is breached, people don’t get credit cards stolen, people die. In fact, one intelligence analyst told me, “If my analysis of the intelligence and social networking data is wrong, I could cost an innocent man his life.”
Coming out of the service, military leaders and intelligence analysts are highly trained, process oriented, and have a heightened sense of security awareness that most civilians don’t understand. Therefore, here is a list of my top 10 reasons to hire a military expert for your cybersecurity needs:
Many of the top cybersecurity experts in the industry, began their careers in the military. Maybe your next hire can have that same potential. If you are interested in seeing if a veteran is right for your cybersecurity needs, contact Fortify Experts at (www.fortifyexperts.com).
To see a list of available military cybersecurity experts go to: https://www.fortifyexperts.com/available-cyber-security-experts/