{"id":4633,"date":"2025-09-01T07:00:00","date_gmt":"2025-09-01T07:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4633"},"modified":"2025-09-01T07:00:00","modified_gmt":"2025-09-01T07:00:00","slug":"women-cyber-leaders-are-on-the-rise-and-paying-it-forward","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4633","title":{"rendered":"Women cyber leaders are on the rise \u2014 and paying it forward"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Female cybersecurity leaders are feeling fairly positive about their standing in a traditionally male-dominated field, although many believe there is still room for improvement. 2025\u2019s International Women in Cyber Day on Sept. 1 sees some strides having been made: While women make up only 22% of the cybersecurity workforce, 55% of female respondents are in managerial or higher positions in their organizations, according to a recent <a href=\"https:\/\/www.isc2.org\/Insights\/2025\/03\/Women-Comprise-22-percent-of-the-Cybersecurity-Workforce\">ISC2 report<\/a>.<\/p>\n<p>\u201cI\u2019m actually really encouraged, because I\u2019ve seen more women step into CISO roles in recent years than I have ever before,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/carol-lee-hobson\/\">Carol Lee Hobson<\/a>, CISO at payment platform provider PayNearMe. \u201cWomen often bring a natural instinct to protect and safeguard, which I think are qualities that align really well with the mission of cybersecurity.\u201d<\/p>\n<p>Further, the talent pipeline is growing with more women entering the field, Hobson adds, referencing the ISC2 report. \u201cThat\u2019s significant, considering how this industry is dominated.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Carol Lee Hobson, CISO, PayNearMe<\/p>\n<p class=\"imageCredit\">PayNearMe<\/p>\n<\/div>\n<p>Still, companies could be doing more to bring women into cybersecurity positions, says <a href=\"https:\/\/www.linkedin.com\/in\/laurenwinchester\/\">Lauren Winchester<\/a>, vice president of cyber risk services at Travelers.<\/p>\n<p>\u201cWomen make up more than half of the population yet represent roughly 20% of the cybersecurity workforce. While the number of women in cyber has increased over the past decade, companies can and should work to continue closing the gender gap in hiring and leadership roles,\u2019\u2019 Winchester says.<\/p>\n<p>Women in the cyber industry need to be recognized, rewarded, and promoted, she says. \u201cLike any industry, you want to be somewhere that provides an opportunity to learn, gain experience, and grow.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Lauren Winchester, VP of cyber risk services, Travelers<\/p>\n<p class=\"imageCredit\">Travelers<\/p>\n<\/div>\n<h2 class=\"wp-block-heading\">Salary discrepancies continue<\/h2>\n<p>Gender parity issues also persist, including in salaries. Another recent <a href=\"https:\/\/www.isc2.org\/Insights\/2025\/03\/More-Work-Needed-to-Deliver-Equal-Pay-in-Cybersecurity\">ISC2 report<\/a> finds a \u201csubstantial average discrepancy in salaries between women and men.\u201d The ISC2 data shows when median US salaries are compared by gender, there is a $10,000 difference between men ($150,000) and women ($140,000) study participants.<\/p>\n<p>\u201cThis difference grows to $14,000 when we compare\u00a0average (mean)\u00a0salaries, with men who responded earning an average of $159,369 compared to women who earn an average of $144,689,\u201d the report said. With seniority, the pay gap decreases as the job level increases.<\/p>\n<p>While organizations on average are moving closer to achieving equal pay among senior-level executives, \u201cinequality is still prevalent across the board,\u201d the report said.<\/p>\n<p>But others findings are promising. \u201cOnce women enter the field, they are finding ways to advance,\u201d the ISC2 Research team said. \u201cThe real challenge is ensuring more women join and thrive at every level.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Incremental progress being made<\/h2>\n<p>There are also mixed feelings about how women in the industry are viewed, and the level of support they receive.<\/p>\n<p>\u201cWhen I first started in this field, being the only woman in the room was just a normal Tuesday,\u201d notes <a href=\"https:\/\/www.linkedin.com\/in\/alicja-cade-37908a6\/\">Alicja Cade<\/a>, director of the Office of the CISO, at Google Cloud. \u201cAnd while things have improved so much, I still get the occasional d\u00e9j\u00e0 vu moment at a networking event in some oak-paneled steakhouse and think, \u2018Okay, we\u2019re not quite there yet!\u2019\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Alicja Cade, director of the Office of the CISO, Google Cloud<\/p>\n<p class=\"imageCredit\">Google Cloud<\/p>\n<\/div>\n<p>Cade finds that \u201cthe spirit of the cyber community\u201d helps level the playing field, because all security practitioners are united by a common purpose, she says, and \u201cpeople genuinely recognize that diverse views and skills matter. The biggest shift for me is that I now walk into most rooms as a security leader who happens to be a woman, not the other way around.\u201d<\/p>\n<p>The most important lesson, Cade stresses, \u201cis to embrace what makes you a unique leader, rather than trying to be someone you\u2019re not \u2014 common sense, isn\u2019t it?\u201d<\/p>\n<p>This isn\u2019t just a social issue \u2014 it\u2019s a core strategy for success, Cade adds.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/cindibcarter\/\">Cindi Carter<\/a>, global CISO at Check Point Software, also recognizes the progress women have made in representation, \u201cand there are many allies helping us build pathways for women into leadership roles, particularly in technology, cybersecurity, and board-level positions.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Cindi Carter, global CISO, Check Point Software<\/p>\n<p class=\"imageCredit\">Check Point Software<\/p>\n<\/div>\n<p>PayNearMe\u2019s Hobson believes that with more young women graduating from STEM programs, and major industries such as financial services, energy, and defense facing increased demand for security leaders, \u201cthere\u2019s never been a greater opportunity for women in this field than right now.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Women determined to mentor other women<\/h2>\n<p>To build unity, women in the field need to make time to support one another, says <a href=\"https:\/\/blueyonder.com\/about\/leadership\/erika-voss\">Erika Voss<\/a>, senior vice president and CSO of Blue Yonder, a provider of digital supply chain management software.<\/p>\n<p>\u201cThere needs to be more ways that women cyber leaders have a chance to get together in a fashion that doesn\u2019t cost anything, but allows for collaboration, lessons learned, and ways to cross-share more on what the challenges are that we are all still facing today, and how to continually power through them,\u201d Voss says. \u201cI am finding that people I started in the industry with are giving up and stepping out because it\u2019s just not worth all the challenges and headaches anymore, which is saddening to see.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Erika Voss, SVP and CSO, Blue Yonder<\/p>\n<p class=\"imageCredit\">Blue Yonder<\/p>\n<\/div>\n<p>There are still industry thought leaders to follow and learn from, Voss says, but it\u2019s incumbent on female cybersecurity leaders to not only \u201cfind the time to spend a few minutes with these women who have come before us [and] are leading the way, but also opening the doors for the future of women.\u201d<\/p>\n<p>There are a multitude of networking and career building <a href=\"https:\/\/www.csoonline.com\/article\/1308934\/8-associations-that-women-in-cybersecurity-should-follow-or-join.html\">groups for women in cyber<\/a> now, observes <a href=\"https:\/\/www.newfront.com\/blog\/author\/jennifer-wilson\">Jennifer Wilson<\/a>, cyber leader at global insurance company Newfront. They include Women in Cybersecurity (WiCys); Women in Cybersecurity Community; Executive Women\u2019s Form (EWF); Women in Cyber Insurance (WICI); and Women in Tech. These groups offer a range of education, mentorship, peer group discussions, networking, and career development for women, says Wilson, adding that she\u2019s a member of most of them.<\/p>\n<p>\u201cI am thrilled to see so many influential women leaders taking the time to extend a hand to lift up other women in the field,\u201d Wilson says.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p>Jennifer Wilson, cyber leader, Newfront<\/p>\n<p class=\"imageCredit\">Newfront<\/p>\n<\/div>\n<p>Traveler\u2019s Winchester agrees. \u201cWomen in cyber and in cyber insurance are really upping their networking game over the past decade, and I am here for it.\u201d<\/p>\n<p>In addition to the other cyber-focused groups, Winchester says a group of women established the International Women\u2019s Cyber Alliance (IWCA), specifically geared at women professionals in cybersecurity, data privacy, insurance, and legal, to network and promote issues important to women.<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/author\/613838231000369\">Shaila Rana<\/a>, chair of the IEEE Standards Association and cybersecurity professor at Purdue Global, is heartened by the fact that more women are entering the field, but believes they still face problems, such as limited mentorship, support, and growth opportunities.<\/p>\n<p>\u201cThere\u2019s progress in representation, but women are still underrepresented in leadership roles and often face subtle biases that require them to continually prove their credibility,\u201d she says.<\/p>\n<p>Rana says she sometimes notices in industry meetings that the ideas women share aren\u2019t \u201cimmediately regarded until they\u2019re echoed later in the conversation.\u201d While that can be discouraging, Rana says this is a reminder of why visibility and advocacy for women in cybersecurity are so important.<\/p>\n<p>\u201cIt motivates me to keep contributing, mentoring, and supporting other women so that our perspectives are not only heard, but valued,\u201d she says. But Rana is encouraged that a shift is occurring. \u201cThere are more organizations being intentional about amplifying women\u2019s voices,\u201d she says, \u201cwhich makes me optimistic about the direction we\u2019re heading [in].\u201d<\/p>\n<p>Google Cloud\u2019s Cade, agrees, saying she actively sponsors equal opportunity in talents.<\/p>\n<p>\u201cMentoring is giving advice, which is great, but sponsoring is using your influence to open doors for others \u2014 putting them forward for that big project or advocating for their promotion when perhaps their voice is muted,\u201d Cade explains. \u201cMy hope is that we get to a point where a woman leading in cyber is so normal we don\u2019t even need to talk about it anymore. That will be truly awesome.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Female cybersecurity leaders are feeling fairly positive about their standing in a traditionally male-dominated field, although many believe there is still room for improvement. 2025\u2019s International Women in Cyber Day on Sept. 1 sees some strides having been made: While women make up only 22% of the cybersecurity workforce, 55% of female respondents are in [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":4613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4633"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4633"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/4613"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}