Laura Bate
Cybersecurity Policy Fellow
The Perils of Planning Gender-Conscious Cybersecurity Panels
Ever tried to assemble a panel of experts? It gets complicated fast. Aside聽 from the crapshoot of aligning schedules, managing to balance an array of backgrounds and experiences is its own version of three-dimensional chess. And just in case we aren鈥檛 having enough fun yet, imagine arranging a diverse and inclusive panel in an industry that is .*
But in the midst of these planning challenges, it鈥檚 easy to forget about the impact of panel-planning on the panelists themselves, particularly women. And particularly women who are invited on the panel because they鈥檙e women…sometimes to break up a manel, other times to talk about diversity in cybersecurity.听
Female experts who step away from their day jobs to advance diversity discussions face a more pernicious challenge than just additional demands on their time. In a field constantly seeking knowledgeable champions willing to take on the issue of gender diversity, those cybersecurity experts that can speak with authority on what it means to be a woman in this space tend to get typecast into that role. This effectively forces women who already must constantly prove their expertise in their field to then also battle the well-intentioned but unhelpful trend of being known as 鈥渢he woman who talks about being a woman.鈥 While that role is important, women who have fought their way into a position of influence in information security rarely want their personal brand to be 鈥渢he gender diversity lady.鈥
And beyond being a career-trajectory hazard, constantly asking an expert to talk about an issue that isn鈥檛 her area of expertise takes takes a mental tax. And so can asking her to talk only about her gender. 鈥淚t […] can be extremely frustrating as I get asked what it鈥檚 like to be a woman in cybersecurity much more frequently than I am asked about my expertise,鈥 Endgame Chief Social Scientist Andrea Little Limbago. In a prior Humans of Cybersecurity post, Limbago described 鈥済ender fatigue,鈥 the worn-out feeling that stems from the implicit assumption that women alone will furnish the time and effort to correct cybersecurity鈥檚 gender imbalance by serving on panels, spearheading workplace initiatives, or becoming role models. 鈥淚t is extremely difficult for the 10% to be expected to change the entire industry, on our own,鈥 she .听
And sometimes, putting a woman on a panel, if it鈥檚 done to fill a 鈥渢oken鈥 slot, can have a major negative backlash. Have there been times that our team has had to dig through our collective rolodex looking specifically for a woman to break up a manel? Yes. Definitely. However, we have always taken as a guiding principle that anyone invited to speak, male or female, should be more than just an expert on cybersecurity generally; they should be the right expert for the panel, which is to say well-matched in terms of seniority, depth of experience, and specific focus on the topic. Paraphrasing Kiersten Todt, a cybersecurity community leader who served as the Executive Director of the Obama Administration鈥檚 Commission on Enhancing National Cybersecurity, the worry is that if you put a woman on a panel who is not as knowledgeable as her fellow panelists just because you are trying to avoid an all-male panel, then it perpetuates the myth that women are not as competent as their male colleagues.
It鈥檚 also really obvious to the women receiving the invitation that they are the tokens, and to the audience: When the only woman on a panel specializes in a tangential topic, is less experienced than the others on stage, or is otherwise a significant outlier to the rest of the panel, it is not hard to guess what happened.听
What鈥檚聽 the correct response for a female invitee in such a situation? Folks who have never been in the situation (and many who have) often suggest, “just decline the invitation if it makes you uncomfortable.” But it’s more complicated than that, because鈥攎uch as we all would rather take a hard pass on the tokenism鈥攎ost of the women in this space really do feel personally committed to serving as a role model for younger women, and passing on the invite means forgoing that chance.
It is not fun to weigh the value of being a role model against the concerns of being treated as anything other than an expert. Katie Moussouris鈥攈acker par excellence, an organizer of the Pentagon鈥檚 bug bounty program, and 国产视频 Cybersecurity Policy Fellow鈥攑ut it succinctly in a this summer: 鈥…when I get an invitation to speak somewhere, not based on my work, but because they want a 鈥榮trong FEMALE speaker,鈥 I die a little more.鈥 She points out that it may not be especially beneficial to be a role model for young women in cybersecurity when that effort only serves draw them into a field that consistently undervalues contributions by women.听
Her argument is at odds with a stark reality: work on gender diversity is essential, and needs to continue. The critically in-demand cybersecurity workforce can鈥檛 afford to ignore the female talent pool. And we can鈥檛 afford to stop having conversations about how to engage more women and girls, which will often involve… women and girls (and, of course, many terrific male allies). At the same time, there are still plenty of things that event organizers鈥攁nd everyone鈥攊n the cybersecurity community can do to make sure women aren鈥檛 unduly burdened with the diversity problem鈥攁nd that their expertise, beyond gender, is highlighted.听
Attracting and retaining women in cybersecurity careers is really hard; we shouldn鈥檛 expect that crafting discussions around the problem will be easy. There are real challenges in addressing gender diversity that simply do not have good solutions. At 国产视频, we constantly run up against issues like respectful manel-busting and framing meaningful conversations on well-worn topics, and we don鈥檛 always have the right answers. To us, the important thing is to continue the discussion about how to do this right鈥攅ven when it gets uncomfortable or complicated.
* I write here specifically about gender dynamics in cybersecurity, but there are certainly parallel considerations in other aspects of diversity. No one wants to be the token person of color, the token person with a non-conventional education, et cetera. I leave those conversations to the people who have lived them rather than trying to address them myself, but readers are certainly encouraged to seek out these perspectives.