* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/) * Securing Our Networks wit... # Securing Our Networks with Women in Cyber [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fsecuring-networks-women-cyber%2F) [](https://twitter.com/share?text=Securing+Our+Networks+with+Women+in+Cyber&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fsecuring-networks-women-cyber%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fsecuring-networks-women-cyber%2F&title=Securing+Our+Networks+with+Women+in+Cyber&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2017/03/securing-networks-women-cyber/&ts=markdown) \[\](mailto:?subject=Securing Our Networks with Women in Cyber) Link copied By [Pamela Warren](https://www.paloaltonetworks.com/blog/author/pwarren/?ts=markdown "Posts by Pamela Warren") Mar 29, 2017 5 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) [CDANS](https://www.paloaltonetworks.com/blog/tag/cdans/?ts=markdown) [Women in Cyber](https://www.paloaltonetworks.com/blog/tag/women-in-cyber/?ts=markdown) [Women In Tech](https://www.paloaltonetworks.com/blog/tag/women-in-tech/?ts=markdown) I was honored to be asked to host a "Women in Cyber" panel for the conference organizers, IQPC, at the 2017 Cyber Defense and Network Security (CDANS) conference in the United Kingdom. My distinguished fellow panelists included Jacqui Chard of the U.K.'s new National Cyber Security Centre; Sherrill Nicely, the CISO of the U.S. Central Intelligence Agency; and LTC Wendi O. Brown, PMP, (NATO) Coalition Exercise Planner, U.S. European Command. I was struck early in our preparations by a few common themes: first, all of us had "evolved into" cybersecurity from a plethora of other disciplines and backgrounds, and second, we are all equally passionate about the field of cyber. As part of my preparation for this panel, I decided to spend some time with my female colleagues at Palo Alto Networks to learn their perspectives, from what led them to their current roles, to role models who had helped them throughout their careers, to other words of wisdom they would share with our CDANS audience. I also produced videos of each of our conversations with them, from our Senior Director of Security Operations to a Senior Software Architect and our regional CSO for Japan. The following are some highlights from these video conversations: * Two women began their careers with their respective Ministries of Defense in Israel and Japan, helping them to form an important foundation upon which to build their cyber careers. I second this notion from my own experience starting out with the U.S. Defense Department. These organizations prove to be great testing grounds for you to experiment with what technologies or operations most interest you, and have valuable on-the-job training in the respective disciplines. * One shared a story of a fellow male colleague who, having appreciated her work, had become her mentor and encouraged her to join him at several different companies. He would later help her to correct salary inequities and encourage her to be her own strong ally in her career. Another shared the story of her grandmother as an early role model, blazing new trails where few women had been before. * Others shared the elements of their careers they enjoy most -- from seeing how cyber impacts every aspect of our lives to being a proud mother to share with her children the role of cyber in protecting our digital way of life. * One encouraged practitioners and managers to get involved personally in their organization's recruitment efforts. Giving candidates direct insights and guidance about their careers is invaluable and a wonderful way to give back. My research for the panel tells me that, [while women are exceeding men in advanced technical degrees](https://data.oecd.org/eduatt/graduation-rate.htm), [more women are leaving the technical field](https://www.ncwit.org/sites/default/files/resources/ncwit_women-in-it_2016-full-report_final-web06012016.pdf) (1). There are myriad reasons for this that we discussed during the panel. But the key takeaways were to encourage all potential cybersecurity professionals -- regardless of where they are in the world, their gender or their degrees. Specifically: 1. **Be willing to sponsor vs. just mentor.** This means [actually going to bat for someone to ensure fairness and equal opportunities when it's needed](http://www.talentinnovation.org/assets/Athena-2-ExecSummFINAL-CTI.pdf) -- I was thrilled to hear shared examples of this from the audience. 2. **Seek employers who support cross-training of existing professionals without pushing their employees back to a junior level to begin a new pursuit.** Many professionals have come to cybersecurity many years after choosing their initial career path, and today their employees -- and indeed the broader market -- are enjoying the results of their contributions. 3. To quote [Nuala O'Connor](https://en.wikipedia.org/wiki/Nuala_O) at a networking event many years ago, **"Lift as you rise"** -- and particularly with someone who doesn't necessarily "look like you." This was guidance one of the Defense Systems Integrators gave to employees when choosing to mentor someone in their organization. 4. **To those hiring or recruiting, don't overthink your idea of the perfect person or degree or background for this role.** As I noted above, many successful professionals in the field today don't have the degree or background you might have anticipated. In fact, one of the government's programs introduced at CDANS is one in which employees are tested for "latent talent" so that the employer can realize the gifts of their*existing* employees for the field of cyber. When I finished the preparations, I reflected upon the many blessings of my own career and called my father. I thanked him for his encouragement of me to follow my own professional interests and do whatever I desired in my career. Serving in law enforcement for 31 years, he had hoped I would consider the national law enforcement agencies he suggested as prospective employers, and saw no limitation preventing me as a woman from entering that field. But ultimately for him, it was important to help me find whatever I would enjoy. We can all encourage the next generation of cybersecurity practitioners -- and not be limited by where we **think** we may find them or by what their resumes may say. Speaking of career encouragement, [if you are a veteran, you may have a calling to continue to "serve" in cyber.](https://www.paloaltonetworks.com/blog/2016/02/palo-alto-networks-academy-collaborates-with-vetsintech/?ts=markdown) We'd love to have you as a member of the team. Cyber is an honorable calling -- and regardless of how any of us got here, I wish you profound success in your careers and the hope that, regardless of where you are or go in your career, that you lift and encourage others as you rise. ###### (1) [OECD Education at a glance, 2015](https://www.oecd.org/gender/data/shareofwomengraduatesbyfieldofeducation.htm), [Study from CSU: Women 1.5 Times More Likely to Leave STEM Pipeline after Calculus Compared to Men: Lack of Mathematical Confidence a Potential Culprit 2016](http://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0157447), [Source](https://www.ncwit.org/sites/default/files/resources/ncwit_women-in-it_2016-full-report_final-web06012016.pdf). To learn more about our other activities at CDANS 2017 this year, please visit: * [CDANS 2017: Keeping Cybersecurity Skills Sharp With Cyber Range](https://www.paloaltonetworks.com/blog/2017/03/gov-cdans-2017-keeping-cybersecurity-skills-sharp-cyber-range/?ts=markdown) * [Securing Our Networks with Women in Cyber](https://www.paloaltonetworks.com/blog/2017/03/securing-networks-women-cyber/?ts=markdown) ### [![](https://ignite.paloaltonetworks.com/federal/assets/img/masthead_federal.png)](https://ignite.paloaltonetworks.com/federal/federalhome.html) ### Federal Ignite '17 Security Conference: Washington, DC If you are in the U.S. government, come to [Federal Ignite 2017](https://ignite.paloaltonetworks.com/federal/federalhome.html) to learn more about what we're doing for you and your peers to make fast threat prevention through automation a reality. *** ** * ** *** ## Related Blogs ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Improving National Security Through Secure AI](https://www.paloaltonetworks.com/blog/2025/05/improving-national-security-through-secure-ai/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Making Every Dollar Count for Federal Cybersecurity](https://www.paloaltonetworks.com/blog/2025/03/making-every-dollar-count-federal-cybersecurity/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue](https://www.paloaltonetworks.com/blog/2018/06/gov-palo-alto-networks-commitment-educating-european-ceos-boards-cybersecurity-business-issue/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Operationalizing the Call for a Cybersecurity Moonshot](https://www.paloaltonetworks.com/blog/2018/04/gov-operationalizing-call-cybersecurity-moonshot/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### The Cybersecurity Canon: Women in Cybersecurity](https://www.paloaltonetworks.com/blog/2017/09/cybersecurity-canon-candidate-book-review-women-cybersecurity/) ### [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) [#### Palo Alto Networks News of the Week -- April 1, 2017](https://www.paloaltonetworks.com/blog/2017/04/palo-alto-networks-news-week-april-1-2017/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language