Table of Contents
- Executive Summary and Community Scan
- Overview: The State of the Cybersecurity Gender Gap
- Section 1: Goals and Motivations
- Section 2: Construction and Curation
- Section 3: Themes and Selected Strategies
- Section 4: The Way Forward
- Appendix A: Implementable Strategies as Proposed by Discussion Groups
- Appendix B: Details on Audience Demographics
- Appendix C: What Can You do to Bring More Women and Girls Into and Up Through Cybersecurity?
Appendix B: Details on Audience Demographics
To enable candid conversation, participants and their organizational affiliations are not named in this report, except in text boxes with direct quotes with the specific approval of those participants. However, understanding the industries and communities of these participants helps contextualize the conversation. To anonymize the participant list while still providing this context, below we describe the roles of the participants and the number of participants in each role.
Many participants fall into more than one category, but are counted only once to accurately reflect the total number of participants. In these cases, we have endeavored to list these individuals by the role most relevant to their reason for being invited to participate. This list includes the meeting facilitator and participants from the project team at New America and the National Initiative for Cybersecurity Education.
- Twelve participants worked in the federal public sector. This number includes a range of agencies and roles. It includes high-level leadership and operational positions. In includes both individuals designing policy and those implementing those policies.
- Seven participants were from the private sector, including three in leadership roles, two responsible for providing strategy for enterprise cybersecurity, and two who were engaged in strategy and entrepreneurship.
- Six participants were current undergraduate students.
- Four participants were leaders in higher education, with a focuses in gender studies, technology, or cybersecurity.
- Four participants were policy researchers.
- Three participants were researchers in behavioral science, organizational change, and/or gender studies.
- Three participants served in roles fundamentally centered around bringing people together at conferences, trainings, or as part of a larger network.
- Two participants were researchers in cybersecurity with federally funded research and development centers.
- Two participants were in human resources strategy, one in the private sector and the other in the public sector.
- One participant was retired military and a current student.
- One participant was in non-profit leadership.
- One participant was in venture capital.