SlideShare a Scribd company logo
The Action Plan for Cyber Diversity
>whoami
> Lifelong learner
> Husband
> Dad
> Information Security Professional
> Cyber Education Board Member
According to the National Security Agency (NSA),
“entry level” for many cybersecurity positions means:
▪ Bachelor’s degree plus 3 years of relevant experience
▪ Master’s degree plus 1 year of relevant experience
▪ Doctoral degree and no experience
▪ Associate degree plus 5 years of in-depth experience clearly related to the
position
What do I mean when I say “Diversity”?
Diversity : composed of varied elements
U.S. Diversity is reaching critical mass.
This is Happening!
https://www.census.gov/content/dam/Census/li
brary/publications/2015/demo/p25-1143.pdf
CompTIA Cyberstates 2021
Why Diversity?
• Public Image
• Drive innovation
• Increase profitability
• Be more secure
What does this have to do with
haxors?
H4xors?
Haxx0rs?
hackers?
The Action Plan!
Cybersecurity Diversity Framework
Empathize and discover patterns of behavior.
What do they need?
Align your focus.
How can I help?
Ideate and design solutions.
What does change look like?
Model and assess together.
How does my thinking need to transform?
Deploy the best model.
What works? What doesn't work?
If you are entry-level/aspiring cyber-
professional
• Network on social media/Ask questions.
• LinkedIn
• Discord
• Twitter
• Research security career paths and make a study plan.
• Attend MeetUps, Conferences, Webinars.
• Apply for targeted jobs.
If you are a parent
• Attend a BSides with them (Virtually or locally).
• http://www.securitybsides.com/w/page/12194156/FrontPage
• Invest in a Raspberry Pi and start a cyber Pi project.
• https://www.cyberpiprojects.com/
• Join a Makerspace as a family.
• Find student groups.
• Share career possibilities.
• https://www.comptia.org/content/it-careers-path-roadmap
• Deploy and secure Internet of Things devices in your home
• Smart bulbs, video doorbells, smart speakers,
thermostats, etc.
• Start a project in the cloud.
• https://www.upgrad.com/blog/aws-projects-ideas/
If you are an educator
 Help students to align with the NICE Workforce
Framework
o https://niccs.cisa.gov/workforce-
development/cyber-security-workforce-framework
 Invite STEM professionals to speak/workshop
 Partner with existing organizations
o https://cin.comptia.org/
o https://www.raspberrypi.org/teach/
o https://teachcomputing.org/
o https://isaaccomputerscience.org/
o https://codeclub.org/en/start-a-code-club
o This is for children aged 9-13 and doesn’t
require that you have coding knowledge.
If you know a student
 Direct them to curated resources
o https://freetraining.dfirdiva.com/free-
training-for-kids
o https://www.raspberrypi.org/
 Encourage them to participate in a Capture The
Flag (CTF) competition
o https://ctf101.org/
o https://www.picoctf.org/
If you are an medium/large employer
• Create true entry-level opportunities.
• Cross train help desk employees with the system
administrators, network administrators and
information security professionals.
• Understand that tech skills can be taught and look
for the intangibles that are indicators of
potential success when interviewing.
If you own a small business/nonprofit
 Protect your business with best practices and
consider the techy people in your life
 https://www.itondemand.com/2021/02/11/best-security-
practices-small-business/
If you just want to help
• Volunteer at a conference.
• Review a resume.
• Answer questions.
• Support existing efforts.
• Remember what it was like to get started.
• Share your journey/skills.
U.S. has almost 500,000 job openings in
cybersecurity
(CBS News)
In a study entitled “Tech leavers” by the Kapor Center for
Social Impact…found that 40% of Black, Hispanic and Native
American men left their jobs due to unfairness and racism
in the workplace.
Kapor Center for Social Impact, Tech
leavers: http://www.kaporcenter.org/tech-leavers/
How can we make it better?
• Mentoring
• Build inclusive culture
• Professional Development
What if we collaborated?
• Technology Innovation Incubators
• Cross-Industry Partnerships
• Cyber-Talent Pipelines
What If we could create true
entry level cyber positions?
• Apprenticeship
• Scalable Positions
• Mentoring
What If we could start STEAM/STEM with
younger students?
• Junior High
• Elementary
• Younger?
 There are many diverse candidates that can succeed and flourish in this field.
 Diverse companies are stronger.
 We all benefit.
 me@keithrchapman.com
 https://www.linkedin.com/in/keithrchapman
• https://www.github.com/s1lv3rl10n

More Related Content

Similar to Cyber Diversity Framework

Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
 
Social Learning Strategy V2
Social Learning Strategy V2Social Learning Strategy V2
Social Learning Strategy V2
David Wilkins
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
Riina Vuorikari
 
How To Get Started In Tech With No Experience
How To Get Started In Tech With No ExperienceHow To Get Started In Tech With No Experience
How To Get Started In Tech With No Experience
Udemezue John
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
Parakum Pathirana
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
HEEG conference
HEEG conferenceHEEG conference
HEEG conference
Lisa Harris
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
Vishal Singh
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
Recruiting with Conscience: How to Hire Diverse Talent
Recruiting with Conscience: How to Hire Diverse TalentRecruiting with Conscience: How to Hire Diverse Talent
Recruiting with Conscience: How to Hire Diverse Talent
Aggregage
 
CIO Magazine Article - October 2014
CIO Magazine Article - October 2014CIO Magazine Article - October 2014
CIO Magazine Article - October 2014Apurva Mehta
 
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
Ken Fuller
 
Digital Understanding 101
Digital Understanding 101Digital Understanding 101
Digital Understanding 101
mcpheecdlegs
 
How Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedHow Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedIntelCollab.com
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
Fernanda Torós
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
Fernanda Torós
 
Using LinkedIn to Promote Applied Baccalaureate Programs
Using LinkedIn to Promote Applied Baccalaureate ProgramsUsing LinkedIn to Promote Applied Baccalaureate Programs
Using LinkedIn to Promote Applied Baccalaureate Programs
Andy Orr
 

Similar to Cyber Diversity Framework (20)

Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Social Learning Strategy V2
Social Learning Strategy V2Social Learning Strategy V2
Social Learning Strategy V2
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
How To Get Started In Tech With No Experience
How To Get Started In Tech With No ExperienceHow To Get Started In Tech With No Experience
How To Get Started In Tech With No Experience
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
HEEG conference
HEEG conferenceHEEG conference
HEEG conference
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Recruiting with Conscience: How to Hire Diverse Talent
Recruiting with Conscience: How to Hire Diverse TalentRecruiting with Conscience: How to Hire Diverse Talent
Recruiting with Conscience: How to Hire Diverse Talent
 
CIO Magazine Article - October 2014
CIO Magazine Article - October 2014CIO Magazine Article - October 2014
CIO Magazine Article - October 2014
 
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
 
Digital Understanding 101
Digital Understanding 101Digital Understanding 101
Digital Understanding 101
 
How Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedHow Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms Succeed
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
Using LinkedIn to Promote Applied Baccalaureate Programs
Using LinkedIn to Promote Applied Baccalaureate ProgramsUsing LinkedIn to Promote Applied Baccalaureate Programs
Using LinkedIn to Promote Applied Baccalaureate Programs
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Cyber Diversity Framework

  • 1. The Action Plan for Cyber Diversity
  • 2. >whoami > Lifelong learner > Husband > Dad > Information Security Professional > Cyber Education Board Member
  • 3. According to the National Security Agency (NSA), “entry level” for many cybersecurity positions means: ▪ Bachelor’s degree plus 3 years of relevant experience ▪ Master’s degree plus 1 year of relevant experience ▪ Doctoral degree and no experience ▪ Associate degree plus 5 years of in-depth experience clearly related to the position
  • 4. What do I mean when I say “Diversity”?
  • 5. Diversity : composed of varied elements
  • 6. U.S. Diversity is reaching critical mass. This is Happening! https://www.census.gov/content/dam/Census/li brary/publications/2015/demo/p25-1143.pdf
  • 8. Why Diversity? • Public Image • Drive innovation • Increase profitability • Be more secure
  • 9. What does this have to do with haxors? H4xors? Haxx0rs? hackers?
  • 12. Empathize and discover patterns of behavior. What do they need?
  • 13. Align your focus. How can I help?
  • 14. Ideate and design solutions. What does change look like?
  • 15. Model and assess together. How does my thinking need to transform?
  • 16. Deploy the best model. What works? What doesn't work?
  • 17. If you are entry-level/aspiring cyber- professional • Network on social media/Ask questions. • LinkedIn • Discord • Twitter • Research security career paths and make a study plan. • Attend MeetUps, Conferences, Webinars. • Apply for targeted jobs.
  • 18. If you are a parent • Attend a BSides with them (Virtually or locally). • http://www.securitybsides.com/w/page/12194156/FrontPage • Invest in a Raspberry Pi and start a cyber Pi project. • https://www.cyberpiprojects.com/ • Join a Makerspace as a family. • Find student groups. • Share career possibilities. • https://www.comptia.org/content/it-careers-path-roadmap • Deploy and secure Internet of Things devices in your home • Smart bulbs, video doorbells, smart speakers, thermostats, etc. • Start a project in the cloud. • https://www.upgrad.com/blog/aws-projects-ideas/
  • 19. If you are an educator  Help students to align with the NICE Workforce Framework o https://niccs.cisa.gov/workforce- development/cyber-security-workforce-framework  Invite STEM professionals to speak/workshop  Partner with existing organizations o https://cin.comptia.org/ o https://www.raspberrypi.org/teach/ o https://teachcomputing.org/ o https://isaaccomputerscience.org/ o https://codeclub.org/en/start-a-code-club o This is for children aged 9-13 and doesn’t require that you have coding knowledge.
  • 20. If you know a student  Direct them to curated resources o https://freetraining.dfirdiva.com/free- training-for-kids o https://www.raspberrypi.org/  Encourage them to participate in a Capture The Flag (CTF) competition o https://ctf101.org/ o https://www.picoctf.org/
  • 21. If you are an medium/large employer • Create true entry-level opportunities. • Cross train help desk employees with the system administrators, network administrators and information security professionals. • Understand that tech skills can be taught and look for the intangibles that are indicators of potential success when interviewing.
  • 22. If you own a small business/nonprofit  Protect your business with best practices and consider the techy people in your life  https://www.itondemand.com/2021/02/11/best-security- practices-small-business/
  • 23. If you just want to help • Volunteer at a conference. • Review a resume. • Answer questions. • Support existing efforts. • Remember what it was like to get started. • Share your journey/skills.
  • 24. U.S. has almost 500,000 job openings in cybersecurity (CBS News)
  • 25. In a study entitled “Tech leavers” by the Kapor Center for Social Impact…found that 40% of Black, Hispanic and Native American men left their jobs due to unfairness and racism in the workplace. Kapor Center for Social Impact, Tech leavers: http://www.kaporcenter.org/tech-leavers/
  • 26. How can we make it better? • Mentoring • Build inclusive culture • Professional Development
  • 27. What if we collaborated? • Technology Innovation Incubators • Cross-Industry Partnerships • Cyber-Talent Pipelines
  • 28. What If we could create true entry level cyber positions? • Apprenticeship • Scalable Positions • Mentoring
  • 29. What If we could start STEAM/STEM with younger students? • Junior High • Elementary • Younger?
  • 30.  There are many diverse candidates that can succeed and flourish in this field.  Diverse companies are stronger.  We all benefit.