{"id":91806,"date":"2020-08-31T11:00:30","date_gmt":"2020-08-31T18:00:30","guid":{"rendered":""},"modified":"2025-06-25T22:41:10","modified_gmt":"2025-06-26T05:41:10","slug":"microsoft-security-cultivate-diverse-cybersecurity-team","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/","title":{"rendered":"Microsoft Security: How to cultivate a diverse cybersecurity team"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"boost-creative-problem-solving-with-a-diverse-cybersecurity-team\">Boost creative problem solving with a diverse cybersecurity team<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In cybersecurity, whether we are talking about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/03\/13\/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners\/\" target=\"_blank\" rel=\"noopener noreferrer\">cryptocurrency mining<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/16\/guarding-against-supply-chain-attacks-part-1-big-picture\/\" target=\"_blank\" rel=\"noopener noreferrer\">supply chain attacks<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/28\/managing-risk-todays-iot-landscape-not-one-and-done\/\" target=\"_blank\" rel=\"noopener noreferrer\">attacks against IoT,<\/a> or <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/06\/16\/exploiting-a-crisis-how-cybercriminals-behaved-during-the-outbreak\/\" target=\"_blank\" rel=\"noopener noreferrer\">COVID-19-related phishing lures<\/a>, we know that gaining the advantage over our adversaries requires greater diversity of data to improve our threat intelligence. If we are to future proof bias in tech however, our teams must also be as diverse, as the problems we are trying to solve.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Unfortunately, our cybersecurity teams don\u2019t reflect this reality. A <a href=\"https:\/\/www.isc2.org\/research\/women-in-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">2019 report by (ISC)<sup>2<\/sup><\/a> found that less than 25 percent of cybersecurity professionals are women. People of color and women aren\u2019t paid as well as white men and are underrepresented in management. Time and again, <a href=\"https:\/\/www.forbes.com\/sites\/eriklarson\/2017\/09\/21\/new-research-diversity-inclusion-better-decision-making-at-work\/#5b9be3884cbf\" target=\"_blank\" rel=\"noopener noreferrer\">studies have found<\/a> that gender-diverse teams <a href=\"https:\/\/www.forbes.com\/sites\/eriklarson\/2017\/09\/21\/new-research-diversity-inclusion-better-decision-making-at-work\/#5b9be3884cbf\" target=\"_blank\" rel=\"noopener noreferrer\">make better business decisions<\/a>&nbsp;73 percent of the time. What\u2019s more, teams that are also diverse in age and geographic location make better decisions 87 percent of the time. With a talent shortfall estimated between <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/broader-perspectives\/cybersecurity-talent-gap.html\" target=\"_blank\" rel=\"noopener noreferrer\">1.5 million<\/a> and <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\">3.5 million<\/a>, we must recruit, train, and retain cyber talent from a wide variety of backgrounds in order to maintain our advantage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"diversity-fuels-innovation\">Diversity fuels innovation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">You can see the evidence that diversity drives innovation when you look at artificial intelligence (AI) and machine learning. The AI capabilities built into Microsoft Security solutions are trained on 8 trillion daily threat signals&nbsp;from a wide variety of products, services, and feeds from around the globe (see Figure 1). Because the data is diverse, AI and machine learning algorithms can detect threats in milliseconds.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"565\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/08\/Diverse-1-1024x565.png\" alt=\"A graph showing Microsoft Intelligent Security.\" class=\"wp-image-91807\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-1024x565.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-300x166.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-768x424.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-1536x848.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-2048x1130.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1: Trillions of signals from around the globe allow Microsoft Security solutions to rapidly detect and respond to threats. <\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Just last year, the World Economic Forum compiled several studies that provide further evidence that <a href=\"https:\/\/www.weforum.org\/agenda\/2019\/04\/business-case-for-diversity-in-the-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\">diversity sparks innovation.<\/a> Cities with large immigration populations tend to have higher economic performance. Businesses with more diverse management teams have higher revenues. A C-suite with more women is likely to be more profitable. When people with different backgrounds and experiences collaborate, unique ideas can flourish. What\u2019s more, if you want to build technology solutions that are inclusive of everyone, diverse teams help avoid bias and develop features that meet the needs of more people.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So how do you increase the diversity of your team? Expand the pipeline. Invest in your team. And create an inclusive culture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"expand-the-pipeline\">Expand the pipeline<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To recruit the very best people from all backgrounds, start by prioritizing unique perspectives. Machine learning, artificial intelligence, and quantum computing hold promise for addressing cyber threats; however, technology is not enough. Some problems can only be solved by people. You need teams that can anticipate what\u2019s next and respond quickly in high-stress situations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If everybody on the team has similar skills and backgrounds, you risk group think and a lack of creativity. It\u2019s why <a href=\"https:\/\/www.peoplemanagement.co.uk\/experts\/research\/diversity-drives-better-decisions#:~:text=Researchers%20found%20that%20when%20diverse,cent%20improvement%20on%20decision%2Dmaking.\" target=\"_blank\" rel=\"noopener noreferrer\">diverse teams make better decisions than individuals 87 percent of the time<\/a> (all-male teams only make better decisions than individuals 58 percent of the time).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To attract the diverse talent you need, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/31\/welcoming-diverse-workforce-cybersecurity-expanding-pipeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">expand your criteria.<\/a> Look beyond the typical degrees, experience level, and certifications that you typically recruit for. Leverage training programs that help people acquire the technical skills you need. For example, <a href=\"https:\/\/blackhoodie.re\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlackHoodie<\/a> is a reverse engineering program for women. Consider people without college degrees, veterans, and people looking to switch careers. Work with colleges and other groups that represent disadvantaged communities, such as historically black colleges and universities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"invest-in-your-team\">Invest in your team<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Cybersecurity teams around the globe are understaffed, while the amount of work continues to grow. Security operation center (SOC) analysts suffer from alert fatigue because they must monitor thousands of alerts\u2014many of them false positives. Stress levels are high, and individuals work long hours. These work conditions can lead to burnout, which makes people less effective.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Reduce routine tasks with AI, machine learning, and automation<\/strong>. AI, machine learning, and automation can empower your team by reducing the noise, so people can focus on challenging threats that are, frankly, more fun. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel<\/a> is a cloud-native SIEM that uses state of the art, scalable machine learning algorithms to correlate millions of low fidelity anomalies to present a few high-fidelity security incidents to analysts. Our research has shown that customers who use <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/reducing-security-alert-fatigue-using-machine-learning-in-azure-sentinel\/#:~:text=Reducing%20security%20alert%20fatigue%20using%20machine%20learning%20in%20Azure%20Sentinel,-Posted%20on%20March&amp;text=We%20have%20thoughtfully%20designed%20the,tailored%20to%20the%20security%20community.\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel achieved a 90 percent reduction in alert fatigue.<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91808\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/08\/Diverse-2.png\" alt=\": Azure Sentinel makes it easy to collect security data across your entire hybrid organization from devices, to users, to apps, to servers on any cloud.An image showing how \" width=\"1694\" height=\"1030\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2.png 1694w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-300x182.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-1024x623.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-768x467.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-1536x934.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-440x268.png 440w\" sizes=\"auto, (max-width: 1694px) 100vw, 1694px\" \/><em>Figure 2: Azure Sentinel makes it easy to collect security data across your entire hybrid organization from devices, to users, to apps, to servers on any cloud.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Provide growth opportunities and training. <\/strong>The threat landscape changes rapidly requiring security professionals to continuously upgrade their skills. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/28\/empower-analysts-reduce-burnout-isecurity-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Human beings also need new challenges to stay engaged<\/a>. Provide opportunities for everyone to use creative problem-solving skills. Encourage individuals to learn from each other, such as through an apprenticeship program. Offer regular training for people at all levels of your organization. The Microsoft SOC focuses its training programs on three key areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Technical tools\/capabilities.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Our organization (mission and assets being protected).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Attackers (motivations, tools, techniques, habits, etc.).<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Take care of employees\u2019 mental health<\/strong>. Stress is driving too many people to leave cybersecurity. In fact, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20170523005924\/en\/TEKsystems-Survey-Finds-Professionals-Setting-Firmer-Boundaries\" target=\"_blank\" rel=\"noopener noreferrer\">stress has motivated 66 percent of IT professionals to look for a new job<\/a>. Fifty-one percent would be willing to take a pay cut for less stress. Late nights and high-pressure incident response take a toll on employees. In these circumstances, it\u2019s important to respect time off. People should be able to enjoy their days off without worrying about work. A collaborative culture that is forgiving of mistakes can also reduce the pressure. Ask your team how they are doing and really listen when they tell you. Their answers may trigger a great idea for alleviating stress.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"create-an-inclusive-culture\">Create an inclusive culture<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/24\/welcoming-retaining-diversity-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">People go where they are invited, but they stay where they are welcome<\/a>. As you bring new people into your security organization, <a href=\"https:\/\/hbr.org\/2020\/01\/5-strategies-for-creating-an-inclusive-workplace\">foster an environment where everybody feels accepted<\/a>. All ideas should be listened to and considered. People who express ideas that challenge old methods can lead to breakthroughs and creativity. Here are a few ideas for making sure everyone feels included:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Solicit input from everybody, so you don\u2019t just hear from those that are comfortable speaking up.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Provide mentorship and sponsorship programs for women and other underrepresented groups to help prepare them for advancement<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Expand your definition of diversity to include neuro atypical, nonbinary, LGBTQ, religious affiliation, and education level in addition to race and gender.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Make a conscious effort to evaluate performance, not communication or presentation style.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/blogs.microsoft.com\/blog\/2020\/06\/23\/addressing-racial-injustice\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hold leadership and vendors accountable for diversity metrics<\/a>.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">As we look past the COVID-19 pandemic, we can expect that cybersecurity challenges will continue to evolve. AI, machine learning, and quantum computing will shape our response, but technology will not be enough. We need creative people to build our products, design our security programs, and respond to threats. We need teams that are diverse as the problems we face.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">website.<\/a>&nbsp; Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.<\/p>\n","protected":false},"author":96,"featured_media":91810,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3750],"threat-intelligence":[],"content-type":[3659],"job-role":[],"product":[3726],"topic":[3683,3685],"coauthors":[1849],"class_list":["post-91806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cryptocurrency-mining","content-type-best-practices","product-microsoft-sentinel","topic-security-management","topic-siem-and-xdr","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-5-1694638266-171","review-flag-8-1694638266-352","review-flag-artif-1694638272-22","review-flag-immig-1694638268-334","review-flag-iot-1694638272-473","review-flag-lever-1694638263-909","review-flag-machi-1694638272-641","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-31T18:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T05:41:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-BANNER.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ann Johnson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-BANNER.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ann Johnson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/\",\"@type\":\"Person\",\"@name\":\"Ann Johnson\"}],\"headline\":\"Microsoft Security: How to cultivate a diverse cybersecurity team\",\"datePublished\":\"2020-08-31T18:00:30+00:00\",\"dateModified\":\"2025-06-26T05:41:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\"},\"wordCount\":1183,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png\",\"keywords\":[\"Cryptocurrency mining\"],\"articleSection\":[\"AI and machine learning\",\"CISO series\",\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\",\"name\":\"Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png\",\"datePublished\":\"2020-08-31T18:00:30+00:00\",\"dateModified\":\"2025-06-26T05:41:10+00:00\",\"description\":\"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png\",\"width\":500,\"height\":263,\"caption\":\"A remote female tech worker on her laptop while two co-workers have a discussion in the backgroud.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security: How to cultivate a diverse cybersecurity team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d\",\"name\":\"Teri Seals-Dormer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"caption\":\"Teri Seals-Dormer\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog","description":"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog","og_description":"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-08-31T18:00:30+00:00","article_modified_time":"2025-06-26T05:41:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-BANNER.png","type":"image\/png"}],"author":"Ann Johnson","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-BANNER.png","twitter_misc":{"Written by":"Ann Johnson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/","@type":"Person","@name":"Ann Johnson"}],"headline":"Microsoft Security: How to cultivate a diverse cybersecurity team","datePublished":"2020-08-31T18:00:30+00:00","dateModified":"2025-06-26T05:41:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/"},"wordCount":1183,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png","keywords":["Cryptocurrency mining"],"articleSection":["AI and machine learning","CISO series","Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/","name":"Microsoft Security: How to cultivate a diverse cybersecurity team | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png","datePublished":"2020-08-31T18:00:30+00:00","dateModified":"2025-06-26T05:41:10+00:00","description":"A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/08\/WIN20_OTG_M_MOPRO_MSI_GS65_Stealth_0047-FEATURE.png","width":500,"height":263,"caption":"A remote female tech worker on her laptop while two co-workers have a discussion in the backgroud."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security: How to cultivate a diverse cybersecurity team"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d","name":"Teri Seals-Dormer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14","url":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","caption":"Teri Seals-Dormer"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=91806"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91806\/revisions"}],"predecessor-version":[{"id":140383,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91806\/revisions\/140383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/91810"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=91806"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=91806"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=91806"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=91806"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=91806"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=91806"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=91806"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=91806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}