Welcome to New America, redesigned for what’s next.

A special message from New America’s CEO and President on our new look.

Read the Note

Appendix A: Implementable Strategies as Proposed by Discussion Groups

Strategies Relating to Theme 1: Empower the Coordinators

Umbrella Organization

Year One: Create the organization; Recruit 3-5 sponsors; Create the business plan; Socialize in broader community; Define mission

Year Two: Evaluate impact of companies that adopted specific hiring principles; Grow to 10-15 companies; Development of a simplified ask; Approach women in society and ask them to focus on cybersecurity

Year Three: Evaluate pitch technique; Grow to 20-25 companies; Utilize popular online media personalities (YouTubers) to do hacker for a day video to reach young women; Partner with US Conference of Mayors for city events

Year Four: Evaluate online media outreach and adjust, if needed; Grow to 30-35 companies; Create a central database for possible positions and training; Create a Tinder-style app (similar to Indeed) and swipe right if the woman is interested in a certain job or training

Year Five: Perform organization evaluation; Grow to 50 companies; Create a “physical demo space” (via Conference of Mayors); Enhance the database

Organization for Systemic Change

Year One: Establish key message; Develop key focus points; Establish a framework; Establish mandate; Identify champions for spreading awareness

Year Two: Identify capital and financial backing; Calculate amount of partners and participants; Release a pilot test project

Year Three: Well-built ecosystem in place; Evaluate the amount of participants (joined)

Year Four: Assess and improve; Measure the overall change within the cybersecurity community

Umbrella Portal and Community of Practice

Year One: Identifying an executive champion; Formations of coalitions

Year Two: Building a strong community of women and supporters of women in cyber

Year Three: Maintaining this coalition as a sustainable resource

Strategies Relating to Theme 2: Engage and collaborate with businesses

Organization Recognition Program

Year One: Council Development and Criteria Planning: Project owner determined; Council of diverse, connected, willing, influential leaders created; Research recruit/retain successes; Partner for insights; Develop certification criteria and metrics (orgs and council); Prepare solid business arguments

Year Two: Testing and Evaluation: Pilot tested with select established, influential organizations; Monitor pilots with quantitative/qualitative research; Reevaluate the program and its feasibility and scalability and adjust, if needed

Year Three: Model Publication, Promotion, Implementation: Publish and promote the model and criteria (key conferences, journals, scholarly articles, etc.); Develop ranking criteria (studying others); Rank organizations (diligently)

Year Four: Organization Ranking and Program Iteration: Rankings published on mainstream media; keep up with organizational progress, monitor program success data, and update rankings accordingly

“Returnship”

Year One: Create business plan; Conduct market survey; Recruit large corporations and others; Create program design

Year Two: Pilot program; Develop outreach and recruitment initiatives and targeted ads; Soft launch in key markets

Year Three: Full launch in the United States; Full media kit and storyline; Refine outreach (individual’s skill gaps to be filled); Partner with influencers and individuals with success stories in cybersecurity to go viral

Year Four: Add in one-year cybersecurity certificate for participants; Go global

Career Path and Narrative

Year One: Create easy-to-understand curriculum; Increase cybersecurity exposure in student body; Identify partners; Build framework for school systems to integrate this curriculum

Year Two: Map a path of credentials for current cybersecurity employees to improve and move up; Make the path of credentials public; Get financial backing; Pilot both

Year Three: Initiate improvement of any pending issues; Evaluate the number of students participating; Expand & implement other schools and businesses

Year Four: Measure progress of new implementation; Well-built structure in place

Strategies Relating to Theme 3: Use marketing, entertainment and media platforms to change the narrative

Multimedia Campaign (e.g. Rosie the Riveter)

Year One: Establish a team of influencers; Find a sponsor; Establish focus group to identify marketing strategies

Year Two: Implement a long-term PR campaign

Media

Year One: Pitch and Content Planning—Group setup; Ideas for 3 shows; Connections; Pitch shows; Confirm partner(s); Storyline, etc. done for 3 shows; Casting auditions w/big names; Group advocates to 3rd party supporters

Year Two: Development—Production/casting members/advertisers/collaborators final; Pilot language written; Following season storylines assessed; Pilot production done; Repeated for all 3 shows

Year Three: On Air—Shows on air; High ratings and positive critic reviews; Wide recognition & promotion (talk shows, Rotten Tomatoes, loyal fans bases)

Year Four: Winning—Bring home accolades; Tangible wins in Hollywood (Emmy nomination, Kids Choice Awards, Teen Choice Awards); Uptick in women joining the cybersecurity workforce; Girls engaged in cybersecurity-related academic curriculum

Other Strategies

Forum for Fathers

Year One: Research—Focus groups to determine areas; Gather past studies; Note similar apps/platforms/conferences/print resources; Craft product outline that details structure and implemented resources

Year Two: Content—Content providers/contributors/producers/writers curated; Acquire site advertisers; Contact potential collaborators (product promotion/growth); Launch product

Year Three: Enhancement—AI used to take product to next level; Acquire improvement feedback from fathers/daughters; Boost reach via AdWords & social media analytics)

Year Four: 2.0—Revamp/reiterate product based on feedback/data/results; Launch 2.0; See substantial increase in K-12 girls in STEM-related courses w/in most active products & engaged communities; Usage increases in users & regions

Establish Women-Focused Recruiting Firms

Year One: The acquisition of funding could be feasible via grants and would contribute to expanding recruitment capabilities for government agencies and corporations.; Develop business case (incorporate societal benefit and ensuring it is legal)

Year Two: The goal would also be to have clients register.

Educational Resource to Mainstream Women in Cybersecurity

Year One: These resources can be distributed through existing educational institutions targeting early education for the establishment of a long-term appreciation for cybersecurity as well as targeting women’s schools (kindergarten through high school and higher education.)

Appendix A: Implementable Strategies as Proposed by Discussion Groups

Table of Contents

Close