国产视频

In Short

Putting Lipstick on a Pig

If we care about gender parity in cybersecurity, we need to change the way that that 鈥渃yber women鈥 are portrayed.

Cyberwoman

I was Googling when tragedy struck. As a cybersecurity strategist, I was trying to find images of a female cybersecurity expert to refresh a dated briefing presentation. When I typed 鈥渃yber, woman鈥 and then clicked 鈥淚mages,鈥 my giant, super-jumbo widescreen monitor was suddenly filled wall-to-wall with sexually explicit imagery. There were women in skin-tight neoprene bodysuits holding silver orbs over their breasts and completely nude women in provocative postures with transparent lines of code covering their bodies. There were futuristically-styled women holding all-too-phallic corn on the cob or huge, intimidating medical syringes. There were women in bondage gear. I closed the tab. Within a few seconds the shock wore off and I initiated a new search, this time with the phrase 鈥渃yber, professional.鈥 The results were just that鈥rofessional, and I found the imagery I needed.

So what鈥檚 the real issue here? Are the engineers tagging imagery or writing algorithms for search results just overtly, blatantly sexist? I suspected that my choice of search terms had caused me to stumble upon a characterized 鈥渃yberwoman.鈥 To check this theory, I Googled up 鈥渃yber, man.鈥 What I found was a montage to Dr. Who鈥檚 鈥淐ybermen鈥濃娾斺奱 fictional race of cyborgs. Somehow, I wasn鈥檛 reassured. How did things get so sexually skewed when it came to the cyberwoman character? At a time when the cybersecurity industry is largely lacking in female representation, I think the characterizations deserve attention.

Cyberspace is an intangible realm and so there鈥檚 a high degree of fantasy, imagination and mystery involved when it鈥檚 integrated into entertainment or media. That leads to the bionic man character, the depictions of shadowy figures, and the sexualized woman character. The issue with these images is that the female versions are hyper-sexualized depictions, some including a nod to sexual violence. The male versions are non-humans, machines incapable of feelings and emotions. This matters because these 鈥渇antasy鈥 characterizations leak into our subconscious perceptions and contribute to the identity of the industry as a whole.

Right now, that identity is largely male-centered: the cybersecurity industry is still only 10 percent female, which has prompted professionals to suggest things like female-only hackathons, women-centric cyber career fairs and corporate mentorship forums to boost parity. The problem with these efforts is that they attempt to put lipstick on a pig鈥娾斺妕o attract women into a field that is defined by questionable visual depictions; a sketchy-guy-in-a-hoodie (the guy that girls are taught to avoid), a de-humanized robot, an objectified hyper-sexualized woman or worse. Until we address the deep cultural and social undercurrents that contribute to the production of this imagery, women will be suspicious and less likely to give a career that has anything to do with cyberspace a chance. Cybersecurity isn鈥檛 just suffering from a gender parity crisis, it鈥檚 suffering from an identity crisis that is contributing to a lack of gender parity. What, exactly, are the characteristics that make up cybersecurity鈥檚 identity? An attack/defend mindset; a threat-centric focus; the lurking presence of powerful adversaries. Add to that list the guy in the hoodie and a skewed vision of women on the wrong side of a social power dynamic. Do we, as a collective industry, really want to continue with this overwhelmingly dark and fear-ridden persona?

Our failure to address the implications of the industry鈥檚 narrowly defined identity is contributing to cybersecurity鈥檚 massive gender gap. So how do we, as professionals in the industry, help to push past limiting contours and expand cybersecurity鈥檚 identity beyond attackers and tools, and beyond fear, uncertainty and doubt?

First, we can change the conversation. For every panel or meeting that focuses on the security of cyberspace, we should also talk about the care and good stewardship of cyberspace. When do we ever discuss ethics of secure engineering or secure coding at conferences, or examine what social responsibility cyber specialists have as they develop new and innovative ways to harness the internet? For example, there鈥檚 a lot of discussion going on regarding the security of self-driving vehicles. Who in the technology industry is talking about the security of the 1.8 million truck drivers in America who may be out of work when self-driving big rigs are a reality?

For teachers, this conversation change could mean incorporating ethics and the underlying philosophies of how technology is used, secured and exploited into your lesson plans. Parents can start asking their teens 鈥渨ho benefits?鈥 and 鈥渨ho gets shafted?鈥 when pirated materials are downloaded. Open dialogue, community-oriented solutions, and peace and consensus-building efforts should be represented as equally as protectionism, adversary profiling and defensive measures. Microsoft鈥檚 recent plea for a Digital Geneva Convention that includes the active assistance of technology companies is a great example of this. We need both police officers and social workers, both the Department of Defense and the Department of State, in order for society to thrive both on and offline.

We can also change the images we use to illustrate the people, places and ideas of cybersecurity. I can influence the visuals used in my day-to-day work鈥娾斺妑eplacing that 鈥済uy-in a-hoodie鈥 image at every turn. For those in charge of designing conferences: Booth Babes have got to go. Sexualized style has a place鈥娾斺奲ut it鈥檚 not for the workplace, especially a workplace that is already fighting an undercurrent of unhealthy female hyper sexuality and traces of sexual violence. CEOs: be aware of the lexicon and imagery that marks your company鈥檚 branding鈥娾斺妋ention allies as often as adversaries; remind your constituents that although the 鈥渂ad guys鈥 are persistent so are the 鈥済ood guys,鈥 and not just because the 鈥済ood guys鈥 are producing tools in rapid fashion but because they are keeping a big-picture view of the importance of an open and transparent Internet.

And then there鈥檚 the change in mindset鈥娾斺妑ethinking the profile of the ideal cybersecurity professional. Human Resources and hiring managers can consider the underlying strengths of new cyber job candidates. If apples compare to apples, choose the candidate with a higher degree of connected thinking or who understands. how their efforts fit into the big picture of human society.

The big picture is that if we don鈥檛 start reshaping cybersecurity鈥檚 identity now, the industry could continue to repel half of the population鈥娾斺妉eaving us missing key perspectives and ideas. What are you waiting for? Share your ideas in words or pictures of how you would reshape cyber鈥檚 identity. Leave your feedback in the comments section, or message me directly, @jgvazzana. I鈥檒l publish a follow-up post highlighting your suggestions.

More 国产视频 the Authors

Johanna Vazzana
Putting Lipstick on a Pig