aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • People

Why Diversity Is A Cybersecurity Imperative For GCAT

  • aster.cloud
  • January 11, 2023
  • 3 minute read

Our quarterly Security Talks series brings together experts from Google Cloud security teams and the industry to share information on our latest security products, innovations and best practices. Below is the keynote address for our Security Talks on Dec. 7, 2022, presented by MK Palmore, director, Office of the CISO at Google Cloud.

Diverse threats call for diverse teams, which is why one of the goals of the Google Cybersecurity Action Team (GCAT) is to foster a more diverse, equitable and inclusive cybersecurity workforce.GCAT debuted in October 2021 as an effort to bring world class security, compliance, privacy, and engineering expertise to our customer interactions, creating a premier security advisory team within Google Cloud that supports the digital transformation efforts of our customers. GCAT’s clear and persistent focus is on the importance of cybersecurity in everything that we do.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Building GCAT was an opportunity to combine existing talent and expertise across a number of domains at Google Cloud that we felt were important for the customer journey. By its nature, GCAT creates cross-team collaboration across the broad spectrum of security fields, including Compliance, Trust, Solutions, and Site Reliability Engineering. The core of the team brings together leadership and expertise across security, customer and solutions engineering, compliance, privacy, and trust. It’s an impressive team of experts who are helping our customers achieve their desired cybersecurity outcomes.

While the global cybersecurity workforce added 464,000 jobs over the past year, there is still a global cybersecurity employment gap of more than 3.4 million positions, according to research published by security industry nonprofit ISC2. Yet while seats go unfilled, cybersecurity has been identified as the top area of concern for enterprise risk across the globe. The importance of securing our digital assets and infrastructure has never been more vital.

Read More  Introduction To Data Analysis Using GCP BigQuery And Python

Tackling the challenge of the talent pool requires three initiatives to happen broadly across the industry:

  1. Hiring managers have to widen the lens they use to identify talent.
  2. We have to do a better job at describing the skills necessary for success in written job descriptions.
  3. We have to do a better job at understanding that each new hire may still require continuous training and development to be a fully functioning and valuable member of an overall team.

Why does diversity in hiring matter?

Cybersecurity is a team sport, and our response to adversarial behavior should be all-encompassing. We have to avail ourselves of the best solutions possible to achieve our desired outcome of protecting business enterprise and consumers. The cybersecurity field is in need of new, fresh perspectives to meet our greatest challenges. Crucially, the stakeholders and benefactors of these changes are increasingly those within diverse communities, so we must do a better job at including these communities in building the solutions that will help us all be safer.

Some steps we’ve taken internally include the creation of a Diversity, Equity, and Inclusion council that is focused on the three pillars of hiring and representation, culture and inclusion, and progression and retention. We understand that there needs to be heavy investment to help impact the organization across the recruiting cycle, the hiring process, and the development initiatives associated with employee growth. This is no small undertaking and is only part of the commitment we have to this overall challenge.

We also support efforts to develop cybersecurity training specific to new entrants into the field. We recognize the value in training, and are supporting our own internal efforts to produce and develop training while also financially supporting initiatives by nonprofits in this space, to bring cybersecurity focused training to a more diverse community.

Read More  A Policy Roadmap For 24/7 Carbon-Free Energy

The need to make our security teams as diverse and inclusive as possible has become an imperative for cybersecurity teams all over the world. We are proud of our emphasis on this internally and in the coming year hope to share some projects we believe will make a difference in this realm. We stand ready to innovate and help change the cybersecurity industry and we are going to accomplish this with the most inclusive and diverse teams we can assemble to help bring change to our industry.

Ultimately, creating more diverse teams is critical to our overall success.

 

You can watch MK Palmore’s Security Talks keynote here.

 

By: M.K. Palmore (Director, Office of the CISO, Google Cloud)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Cybersecurity
  • Diversity
  • Google Cloud
You May Also Like
View Post
  • Featured
  • People

Conclave: How A New Pope Is Chosen

  • April 25, 2025
View Post
  • People
  • Technology

AI is automating our jobs – but values need to change if we are to be liberated by it

  • April 17, 2025
Cloud
View Post
  • Engineering
  • People
  • Public Cloud

Why We Need Both Cloud Engineers And Cloud Architects

  • March 11, 2024
View Post
  • People
  • Technology
  • Work & Jobs

Usher’s New Look Embarks on AI-Focused Collaboration with IBM to Set Students up for Career Success

  • March 7, 2024
goswifties-taylor-swift-travis-kelce-fathers-daughters-super-bowl-bonding
View Post
  • Featured
  • People

How Taylor Swift Unexpectedly Brought Fathers and Daughters Together Through Football

  • February 11, 2024
Cloud
View Post
  • People
  • Technology

Clean Air Is A Valuable Economic Asset. Here Are 4 Steps To Achieve It

  • January 31, 2024
Earth
View Post
  • People

Why Standards And Controls Are Essential To The Future Of Digital Financial Markets

  • January 31, 2024
Netherlands
View Post
  • People

How We Can Identify Climate-Vulnerable Neighbourhoods And Protect Inhabitants

  • January 26, 2024

Stay Connected!
LATEST
  • 1
    Enterprises are keen on cloud repatriation – but not for all workloads
    • June 4, 2025
  • 2
    The Summer Adventures : Hiking and Nature Walks Essentials
    • June 2, 2025
  • 3
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 4
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 7
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 9
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 10
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.