CISO Trainings , Governance , Recruitment & Reskilling Strategy

Women in Cybersecurity: A Progress Report

Mary-Jo de Leeuw of (ISC)2 Shares Insights From New Study
Women in Cybersecurity: A Progress Report
Mary-Jo de Leeuw of (ISC)2

Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.

A career cybersecurity technology consultant, de Leeuw has a first-hand view of women's challenges in cybersecurity.

"I've been working in cybersecurity exclusively for nearly 20 years, and when I first started there were only three other women in all of the Netherlands who focused on the industry," says de Leeuw, now the director of cybersecurity advocacy for EMEA at (ISC)2. "The growth has been considerable, and in the face of the worldwide talent shortage in cybersecurity, we need more women to bring their perspective to problem-solving."

In an interview about the new (ISC)2 report, de Leeuw discusses:

  • Key findings from the study;
  • Where women have made significant career progress;
  • What security leaders can do to build upon this momentum.

A career cybersecurity technology consultant, deLeeuw served as an associate partner for cybersecurity and Innovation at Revnext, a Dutch consulting firm that advises executive management of governments, listed companies and NGOs in the areas of high-technology innovation, strategic development and performance improvement. Previously, she spent 15 years as managing director of Bee-u.nl, another strategic consulting firm. She has donated her services as the founder and president of the Platform Internet of Toys, an international community that consults on the security implications for connected toys. She was also co-founder and vice president of the Women in Cyber Security Foundation, and has served on the boards of the ALL Women Economic Forum, Women Leaders@Digital Europe, CyberTRUST and Coding Girls.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.