Table of Contents
- Executive Summary and Community Scan
- Overview: The State of the Cybersecurity Gender Gap
- Section 1: Goals and Motivations
- Section 2: Construction and Curation
- Section 3: Themes and Selected Strategies
- Section 4: The Way Forward
- Appendix A: Implementable Strategies as Proposed by Discussion Groups
- Appendix B: Details on Audience Demographics
- Appendix C: What Can You do to Bring More Women and Girls Into and Up Through Cybersecurity?
Appendix A: Implementable Strategies as Proposed by Discussion Groups
Strategies Relating to Theme 1: Empower the Coordinators
Umbrella Organization
Year One: Create the organization; Recruit 3-5 sponsors; Create the business plan; Socialize in broader community; Define mission
Year Two: Evaluate impact of companies that adopted specific hiring principles; Grow to 10-15 companies; Development of a simplified ask; Approach women in society and ask them to focus on cybersecurity
Year Three: Evaluate pitch technique; Grow to 20-25 companies; Utilize popular online media personalities (YouTubers) to do hacker for a day video to reach young women; Partner with US Conference of Mayors for city events
Year Four: Evaluate online media outreach and adjust, if needed; Grow to 30-35 companies; Create a central database for possible positions and training; Create a Tinder-style app (similar to Indeed) and swipe right if the woman is interested in a certain job or training
Year Five: Perform organization evaluation; Grow to 50 companies; Create a “physical demo space” (via Conference of Mayors); Enhance the database
Organization for Systemic Change
Year One: Establish key message; Develop key focus points; Establish a framework; Establish mandate; Identify champions for spreading awareness
Year Two: Identify capital and financial backing; Calculate amount of partners and participants; Release a pilot test project
Year Three: Well-built ecosystem in place; Evaluate the amount of participants (joined)
Year Four: Assess and improve; Measure the overall change within the cybersecurity community
Umbrella Portal and Community of Practice
Year One: Identifying an executive champion; Formations of coalitions
Year Two: Building a strong community of women and supporters of women in cyber
Year Three: Maintaining this coalition as a sustainable resource
Strategies Relating to Theme 2: Engage and collaborate with businesses
Organization Recognition Program
Year One: Council Development and Criteria Planning: Project owner determined; Council of diverse, connected, willing, influential leaders created; Research recruit/retain successes; Partner for insights; Develop certification criteria and metrics (orgs and council); Prepare solid business arguments
Year Two: Testing and Evaluation: Pilot tested with select established, influential organizations; Monitor pilots with quantitative/qualitative research; Reevaluate the program and its feasibility and scalability and adjust, if needed
Year Three: Model Publication, Promotion, Implementation: Publish and promote the model and criteria (key conferences, journals, scholarly articles, etc.); Develop ranking criteria (studying others); Rank organizations (diligently)
Year Four: Organization Ranking and Program Iteration: Rankings published on mainstream media; keep up with organizational progress, monitor program success data, and update rankings accordingly
“Returnship”
Year One: Create business plan; Conduct market survey; Recruit large corporations and others; Create program design
Year Two: Pilot program; Develop outreach and recruitment initiatives and targeted ads; Soft launch in key markets
Year Three: Full launch in the United States; Full media kit and storyline; Refine outreach (individual’s skill gaps to be filled); Partner with influencers and individuals with success stories in cybersecurity to go viral
Year Four: Add in one-year cybersecurity certificate for participants; Go global
Career Path and Narrative
Year One: Create easy-to-understand curriculum; Increase cybersecurity exposure in student body; Identify partners; Build framework for school systems to integrate this curriculum
Year Two: Map a path of credentials for current cybersecurity employees to improve and move up; Make the path of credentials public; Get financial backing; Pilot both
Year Three: Initiate improvement of any pending issues; Evaluate the number of students participating; Expand & implement other schools and businesses
Year Four: Measure progress of new implementation; Well-built structure in place
Strategies Relating to Theme 3: Use marketing, entertainment and media platforms to change the narrative
Multimedia Campaign (e.g. Rosie the Riveter)
Year One: Establish a team of influencers; Find a sponsor; Establish focus group to identify marketing strategies
Year Two: Implement a long-term PR campaign
Media
Year One: Pitch and Content Planning—Group setup; Ideas for 3 shows; Connections; Pitch shows; Confirm partner(s); Storyline, etc. done for 3 shows; Casting auditions w/big names; Group advocates to 3rd party supporters
Year Two: Development—Production/casting members/advertisers/collaborators final; Pilot language written; Following season storylines assessed; Pilot production done; Repeated for all 3 shows
Year Three: On Air—Shows on air; High ratings and positive critic reviews; Wide recognition & promotion (talk shows, Rotten Tomatoes, loyal fans bases)
Year Four: Winning—Bring home accolades; Tangible wins in Hollywood (Emmy nomination, Kids Choice Awards, Teen Choice Awards); Uptick in women joining the cybersecurity workforce; Girls engaged in cybersecurity-related academic curriculum
Other Strategies
Forum for Fathers
Year One: Research—Focus groups to determine areas; Gather past studies; Note similar apps/platforms/conferences/print resources; Craft product outline that details structure and implemented resources
Year Two: Content—Content providers/contributors/producers/writers curated; Acquire site advertisers; Contact potential collaborators (product promotion/growth); Launch product
Year Three: Enhancement—AI used to take product to next level; Acquire improvement feedback from fathers/daughters; Boost reach via AdWords & social media analytics)
Year Four: 2.0—Revamp/reiterate product based on feedback/data/results; Launch 2.0; See substantial increase in K-12 girls in STEM-related courses w/in most active products & engaged communities; Usage increases in users & regions
Establish Women-Focused Recruiting Firms
Year One: The acquisition of funding could be feasible via grants and would contribute to expanding recruitment capabilities for government agencies and corporations.; Develop business case (incorporate societal benefit and ensuring it is legal)
Year Two: The goal would also be to have clients register.
Educational Resource to Mainstream Women in Cybersecurity
Year One: These resources can be distributed through existing educational institutions targeting early education for the establishment of a long-term appreciation for cybersecurity as well as targeting women’s schools (kindergarten through high school and higher education.)