{"id":14754,"date":"2023-02-09T20:01:37","date_gmt":"2023-02-10T01:01:37","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=14754"},"modified":"2025-07-25T11:08:12","modified_gmt":"2025-07-25T15:08:12","slug":"inspiring-young-women-to-consider-cybersecurity-careers","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/es\/inspiring-young-women-to-consider-cybersecurity-careers\/","title":{"rendered":"Fomentar las carreras profesionales femeninas en ciberseguridad | KnowledgeFlow"},"content":{"rendered":"<style>.kb-image14754_24e30c-5d .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image14754_24e30c-5d\"><figure class=\"alignleft size-large\"><a href=\"https:\/\/knowledgeflow.org\/\" class=\"kb-advanced-image-link\"><img decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/10\/cropped-kcf-primary-logo-500x250-1.png.webp\" alt=\"\" class=\"kb-img\" title=\"\"><\/a><\/figure><\/div>\n\n\n\n<p>February 11 is <a href=\"https:\/\/www.un.org\/en\/observances\/women-and-girls-in-science-day\" target=\"_blank\" rel=\"noopener\"><strong>International Day of Women and Girls in Science<\/strong><\/a> and <a href=\"https:\/\/cyberstartcanada.com\/\" target=\"_blank\" rel=\"noopener\">CyberStart Canada<\/a> is celebrating girls and young women in <a href=\"https:\/\/cybersecurecatalyst.ca\/\" target=\"_blank\" rel=\"noopener\">Rogers Cybersecure Catalyst<\/a>\u2019s favourite subject of the applied sciences: cybersecurity!<\/p>\n\n\n<style>.kb-image14754_5e231b-cd.kb-image-is-ratio-size, .kb-image14754_5e231b-cd .kb-image-is-ratio-size{max-width:605px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image14754_5e231b-cd.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image14754_5e231b-cd .kb-image-is-ratio-size{align-self:unset;}.kb-image14754_5e231b-cd figure{max-width:605px;}.kb-image14754_5e231b-cd .image-is-svg, .kb-image14754_5e231b-cd .image-is-svg img{width:100%;}.kb-image14754_5e231b-cd .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image14754_5e231b-cd\"><figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-scaled.jpg\" alt=\"CyberStart Canada picture promoting hidden cyber talents and cybersecurity careers for women. \" class=\"kb-img wp-image-14755\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-scaled.jpg 2560w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-scaled-600x338.jpg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-768x432.jpg 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-1536x864.jpg 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_2-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure><\/div>\n\n\n\n<p>Cybersecurity careers are evolving quickly, and building a more cybersecure world requires diversity of backgrounds, genders, education, and talents. Indeed, women have made significant strides in pursuing cybersecurity careers in historically male-dominated fields; but in Canada, women still make up less than <a href=\"https:\/\/nuclearsafety.gc.ca\/eng\/resources\/women-in-stem.cfm#:~:text=In%20Canada%2C%20women%20make%20up,to%20a%20large%20untapped%20resource.\" target=\"_blank\" rel=\"noopener\">25%<\/a> of people employed in STEM.<\/p>\n\n\n\n<p>So what\u2019s missing? In order to attract more women into STEM-related fields, there needs to be more awareness of post-secondary and alternative educational opportunities; awareness of career possibilities; awareness of the interdisciplinary learning opportunities within STEM. Encouraging cybersecurity careers for women is crucial to closing this gap and enhancing the diversity of the workforce.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17, .wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17[data-kb-block=\"kb-adv-heading14754_c613c2-17\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17[data-kb-block=\"kb-adv-heading14754_c613c2-17\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading14754_c613c2-17[data-kb-block=\"kb-adv-heading14754_c613c2-17\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading14754_c613c2-17 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading14754_c613c2-17\"><strong><strong><strong>Fostering cybersecurity careers for women through innovative programs<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>The Catalyst and RBC partnered to support the growth of CyberStart Canada, allowing hundreds of young Canadians to discover cybersecurity careers as a potential path for the future. The inaugural September 2022 program with Public Safety Canada, and the February 2023 expansion program with RBC, continue to support high school-aged girls&#8217; exploration into cybersecurity using gamification to measurably improve cyber-related knowledge and skills, ultimately raising awareness of future cybersecurity careers for women.<\/p>\n\n\n\n<p>In the US, <a href=\"https:\/\/www.randstad.ca\/employers\/workplace-insights\/women-in-the-workplace\/women-in-stem-where-we-are-now\/#:~:text=78%25%20of%20STEM%20college%20students%20say%20they%20decided%20to%20study%20it%20in%20high%20school.\" target=\"_blank\" rel=\"noopener\">78%<\/a> of STEM college students report that they decided to pursue an interest in STEM in post-secondary while in high school. Yet, a 2021 Statistics Canada study suggests that women are <a href=\"https:\/\/www150.statcan.gc.ca\/n1\/pub\/36-28-0001\/2021011\/article\/00004-eng.htm#:~:text=students.%20The%20results%20suggest%20that%20among%20high%20school%20graduates%2C-,women%20are%2029.8%25%20less%20likely%20than%20men%20to%20enrol%20in%20a%20postsecondary%20STEM%20program%20shortly%20after%20graduation,-.%20The%20gender%20gap%20in%20STEM%20enrolment%20falls%20to%2019.9\" target=\"_blank\" rel=\"noopener\">29.8%<\/a> less likely than men to enroll in a post-secondary STEM program after high school graduation. So, capturing young women\u2019s curiosity about STEM subjects and making them an integral part of their educational experience will positively impact the long-term success and diversity of the talent pipeline in cybersecurity careers for women.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3, .wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3[data-kb-block=\"kb-adv-heading14754_f64ff4-b3\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3[data-kb-block=\"kb-adv-heading14754_f64ff4-b3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading14754_f64ff4-b3[data-kb-block=\"kb-adv-heading14754_f64ff4-b3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading14754_f64ff4-b3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading14754_f64ff4-b3\"><strong>Women in Cybersecurity: Industry Insights<\/strong><\/h2>\n\n\n\n<p>The Catalyst sat down with four women in the cybersecurity industry to discuss their journey into cybersecurity careers. Here is what these cyber professionals had to say when asked:<\/p>\n\n\n\n<p><strong>What sparked your interest in cybersecurity?<\/strong><\/p>\n\n\n<style>.kb-image14754_6407b4-ef.kb-image-is-ratio-size, .kb-image14754_6407b4-ef .kb-image-is-ratio-size{max-width:595px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image14754_6407b4-ef.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image14754_6407b4-ef .kb-image-is-ratio-size{align-self:unset;}.kb-image14754_6407b4-ef figure{max-width:595px;}.kb-image14754_6407b4-ef .image-is-svg, .kb-image14754_6407b4-ef .image-is-svg img{width:100%;}.kb-image14754_6407b4-ef .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image14754_6407b4-ef\"><figure class=\"alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-scaled.jpg\" alt=\"CyberStart Canada: Students between grades 8-12 get free access to CyberStart\" class=\"kb-img wp-image-14756\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-scaled.jpg 2560w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-scaled-600x338.jpg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-768x432.jpg 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-1536x864.jpg 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/010223-CSC-Socials_AW_1200x675_3-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure><\/div>\n\n\n\n<p><strong>Chima:<\/strong> &#8220;I\u2019ve always been interested in cybersecurity; I started my career in IT infrastructure administration. However, what really sparked my interest was about two years ago when I was managing a digital platform for youth. In the midst of its success, we experienced a terrible cyber breach on the platform and had to rebuild it from scratch. It made me realize how valuable things are, all things; if they are not secured, you can lose everything.&#8221;<\/p>\n\n\n\n<p><strong>Vandana:<\/strong> &#8220;I was always curious to know what they did behind the scenes in cybersecurity. In my previous workplace, we had cybersecurity but it was just a page with a few questions. I never knew what the answers were and that made me curious to know and learn more. I have always wanted to protect young, vulnerable children and seniors. My role in cybersecurity has allowed me to do that.&#8221;<\/p>\n\n\n\n<p><strong>Thulasi:<\/strong> &#8220;I got into cybersecurity while working at an auto finance company, and they were looking for someone for a security governance role. Little did I know that it was going to ignite this major interest for me. Two things in particular that sparked my interest were: (1) my love for constantly learning. Prior to being in cybersecurity, my background is in education, so I\u2019ve always enjoyed learning new things. And; (2) my love for crime books and shows. Sometimes, depending on your role in cybersecurity, you feel like a detective in an online world. I can get bored easily, and with the cybersecurity field, there is always something to do and something to learn. The best part is that I get to bring the skills I developed from my background in education and my days in auto finance, and bring different perspectives to the field. There\u2019s no one way of doing it. Each day is different.&#8221;<\/p>\n\n\n\n<p><strong>AJ:<\/strong> &#8220;I have an IT background focused in data. I have also been interested in the cyber side of things because it doesn\u2019t mean that if I work in IT I know everything about cyber. Turns out there are a lot of tools, theories and practices that we have to be aware of. Cybersecurity is a growing trend. Our choices in the cyberworld today can have a ripple effect tomorrow. Cybersecurity incidents are rising, and we need to take one step forward to defend the cyberworld. We need to start somewhere, and the time to start is now.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El 11 de febrero es el D\u00eda Internacional de la Mujer y la Ni\u00f1a en la Ciencia y CyberStart Canada celebra a las ni\u00f1as y j\u00f3venes en el tema favorito de Rogers Cybersecure Catalyst de las ciencias aplicadas: \u00a1la ciberseguridad!<\/p>","protected":false},"author":8,"featured_media":14761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[390,408,409,382,410,364],"class_list":["post-14754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-cyber-crime","tag-grades-9-12","tag-malware","tag-parents","tag-spyware","tag-teachers"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":390,"label":"cyber crime"},{"value":408,"label":"grades 9-12"},{"value":409,"label":"malware"},{"value":382,"label":"parents"},{"value":410,"label":"spyware"},{"value":364,"label":"teachers"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/Untitled-design-4.png",1024,536,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":390,"name":"cyber crime","slug":"cyber-crime","term_group":0,"term_taxonomy_id":390,"taxonomy":"post_tag","description":"","parent":0,"count":15,"filter":"raw"},{"term_id":408,"name":"grades 9-12","slug":"grades-9-12","term_group":0,"term_taxonomy_id":408,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":409,"name":"malware","slug":"malware","term_group":0,"term_taxonomy_id":409,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":382,"name":"parents","slug":"parents","term_group":0,"term_taxonomy_id":382,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw"},{"term_id":410,"name":"spyware","slug":"spyware","term_group":0,"term_taxonomy_id":410,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":364,"name":"teachers","slug":"teachers","term_group":0,"term_taxonomy_id":366,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/14754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=14754"}],"version-history":[{"count":1,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/14754\/revisions"}],"predecessor-version":[{"id":32364,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/14754\/revisions\/32364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/14761"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=14754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/categories?post=14754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/tags?post=14754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}