{"id":36897,"date":"2020-08-31T18:00:30","date_gmt":"2020-08-31T18:00:30","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91806"},"modified":"2020-08-31T18:00:30","modified_gmt":"2020-08-31T18:00:30","slug":"microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/","title":{"rendered":"Microsoft Security: How to cultivate a diverse cybersecurity team"},"content":{"rendered":"<p>In cybersecurity, whether we are talking about <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/03\/13\/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners\/\" target=\"_blank\" rel=\"noopener noreferrer\">cryptocurrency mining<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/16\/guarding-against-supply-chain-attacks-part-1-big-picture\/\" target=\"_blank\" rel=\"noopener noreferrer\">supply chain attacks<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/28\/managing-risk-todays-iot-landscape-not-one-and-done\/\" target=\"_blank\" rel=\"noopener noreferrer\">attacks against IoT,<\/a> or <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/06\/16\/exploiting-a-crisis-how-cybercriminals-behaved-during-the-outbreak\/\" target=\"_blank\" rel=\"noopener noreferrer\">COVID-19-related phishing lures<\/a>, we know that gaining the advantage over our adversaries requires greater diversity of data to improve our threat intelligence. If we are to future proof bias in tech however, our teams must also be as diverse, as the problems we are trying to solve.<\/p>\n<p>Unfortunately, our cybersecurity teams don\u2019t reflect this reality. A <a href=\"https:\/\/www.isc2.org\/research\/women-in-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">2019 report by (ISC)<sup>2<\/sup><\/a> found that less than 25 percent of cybersecurity professionals are women. People of color and women aren\u2019t paid as well as white men and are underrepresented in management. Time and again, <a href=\"https:\/\/www.forbes.com\/sites\/eriklarson\/2017\/09\/21\/new-research-diversity-inclusion-better-decision-making-at-work\/#5b9be3884cbf\" target=\"_blank\" rel=\"noopener noreferrer\">studies have found<\/a> that gender-diverse teams <a href=\"https:\/\/www.forbes.com\/sites\/eriklarson\/2017\/09\/21\/new-research-diversity-inclusion-better-decision-making-at-work\/#5b9be3884cbf\" target=\"_blank\" rel=\"noopener noreferrer\">make better business decisions<\/a>&nbsp;73 percent of the time. What\u2019s more, teams that are also diverse in age and geographic location make better decisions 87 percent of the time. With a talent shortfall estimated between <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/broader-perspectives\/cybersecurity-talent-gap.html\" target=\"_blank\" rel=\"noopener noreferrer\">1.5 million<\/a> and <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\">3.5 million<\/a>, we must recruit, train, and retain cyber talent from a wide variety of backgrounds in order to maintain our advantage.<\/p>\n<h2>Diversity fuels innovation<\/h2>\n<p>You can see the evidence that diversity drives innovation when you look at artificial intelligence (AI) and machine learning. The AI capabilities built into Microsoft Security solutions are trained on 8 trillion daily threat signals&nbsp;from a wide variety of products, services, and feeds from around the globe (see Figure 1). Because the data is diverse, AI and machine learning algorithms can detect threats in milliseconds.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91807\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-1024x565.png\" alt=\"A graph showing Microsoft Intelligent Security.\" width=\"1024\" height=\"565\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-1024x565.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-300x166.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-768x424.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-1536x848.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-1-2048x1130.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p><em>Figure 1: Trillions of signals from around the globe allow Microsoft Security solutions to rapidly detect and respond to threats. <\/em><\/p>\n<p>Just last year, the World Economic Forum complied several studies that provide further evidence that <a href=\"https:\/\/www.weforum.org\/agenda\/2019\/04\/business-case-for-diversity-in-the-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\">diversity sparks innovation.<\/a> Cities with large immigration populations tend to have higher economic performance. Businesses with more diverse management teams have higher revenues. A C-suite with more women is likely to be more profitable. When people with different backgrounds and experiences collaborate, unique ideas can flourish. What\u2019s more, if you want to build technology solutions that are inclusive of everyone, diverse teams help avoid bias and develop features that meet the needs of more people.<\/p>\n<p>So how do you increase the diversity of your team? Expand the pipeline. Invest in your team. And create an inclusive culture.<\/p>\n<h2>Expand the pipeline<\/h2>\n<p>To recruit the very best people from all backgrounds, start by prioritizing unique perspectives. Machine learning, artificial intelligence, and quantum computing hold promise for addressing cyber threats; however, technology is not enough. Some problems can only be solved by people. You need teams that can anticipate what\u2019s next and respond quickly in high-stress situations.<\/p>\n<p>If everybody on the team has similar skills and backgrounds, you risk group think and a lack of creativity. It\u2019s why <a href=\"https:\/\/www.peoplemanagement.co.uk\/experts\/research\/diversity-drives-better-decisions#:~:text=Researchers%20found%20that%20when%20diverse,cent%20improvement%20on%20decision%2Dmaking.\" target=\"_blank\" rel=\"noopener noreferrer\">diverse teams make better decisions than individuals 87 percent of the time<\/a> (all-male teams only make better decisions than individuals 58 percent of the time).<\/p>\n<p>To attract the diverse talent you need, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/31\/welcoming-diverse-workforce-cybersecurity-expanding-pipeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">expand your criteria.<\/a> Look beyond the typical degrees, experience level, and certifications that you typically recruit for. Leverage training programs that help people acquire the technical skills you need. For example, <a href=\"https:\/\/blackhoodie.re\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlackHoodie<\/a> is a reverse engineering program for women. Consider people without college degrees, veterans, and people looking to switch careers. Work with colleges and other groups that represent disadvantaged communities, such as historically black colleges and universities.<\/p>\n<h2>Invest in your team<\/h2>\n<p>Cybersecurity teams around the globe are understaffed, while the amount of work continues to grow. Security operation center (SOC) analysts suffer from alert fatigue because they must monitor thousands of alerts\u2014many of them false positives. Stress levels are high, and individuals work long hours. These work conditions can lead to burnout, which makes people less effective.<\/p>\n<p><strong>Reduce routine tasks with AI, machine learning, and automation<\/strong>. AI, machine learning, and automation can empower your team by reducing the noise, so people can focus on challenging threats that are, frankly, more fun. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel<\/a> is a cloud-native SIEM that uses state of the art, scalable machine learning algorithms to correlate millions of low fidelity anomalies to present a few high-fidelity security incidents to analysts. Our research has shown that customers who use <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/reducing-security-alert-fatigue-using-machine-learning-in-azure-sentinel\/#:~:text=Reducing%20security%20alert%20fatigue%20using%20machine%20learning%20in%20Azure%20Sentinel,-Posted%20on%20March&amp;text=We%20have%20thoughtfully%20designed%20the,tailored%20to%20the%20security%20community.\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel achieved a 90 percent reduction in alert fatigue.<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91808\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2.png\" alt=\": Azure Sentinel makes it easy to collect security data across your entire hybrid organization from devices, to users, to apps, to servers on any cloud.An image showing how \" width=\"1694\" height=\"1030\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2.png 1694w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-300x182.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-1024x623.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-768x467.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-1536x934.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Diverse-2-440x268.png 440w\" sizes=\"auto, (max-width: 1694px) 100vw, 1694px\"><em>Figure 2: Azure Sentinel makes it easy to collect security data across your entire hybrid organization from devices, to users, to apps, to servers on any cloud.<\/em><\/p>\n<p><strong>Provide growth opportunities and training. <\/strong>The threat landscape changes rapidly requiring security professionals to continuously upgrade their skills. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/28\/empower-analysts-reduce-burnout-isecurity-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Human beings also need new challenges to stay engaged<\/a>. Provide opportunities for everyone to use creative problem-solving skills. Encourage individuals to learn from each other, such as through an apprenticeship program. Offer regular training for people at all levels of your organization. The Microsoft SOC focuses its training programs on three key areas:<\/p>\n<ul>\n<li>Technical tools\/capabilities.<\/li>\n<li>Our organization (mission and assets being protected).<\/li>\n<li>Attackers (motivations, tools, techniques, habits, etc.).<\/li>\n<\/ul>\n<p><strong>Take care of employees\u2019 mental health<\/strong>. Stress is driving too many people to leave cybersecurity. In fact, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20170523005924\/en\/TEKsystems-Survey-Finds-Professionals-Setting-Firmer-Boundaries\" target=\"_blank\" rel=\"noopener noreferrer\">stress has motivated 66 percent of IT professionals to look for a new job<\/a>. Fifty-one percent would be willing to take a pay cut for less stress. Late nights and high-pressure incident response take a toll on employees. In these circumstances, it\u2019s important to respect time off. People should be able to enjoy their days off without worrying about work. A collaborative culture that is forgiving of mistakes can also reduce the pressure. Ask your team how they are doing and really listen when they tell you. Their answers may trigger a great idea for alleviating stress.<\/p>\n<h2>Create an inclusive culture<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/24\/welcoming-retaining-diversity-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">People go where they are invited, but they stay where they are welcome<\/a>. As you bring new people into your security organization, <a href=\"https:\/\/hbr.org\/2020\/01\/5-strategies-for-creating-an-inclusive-workplace\">foster an environment where everybody feels accepted<\/a>. All ideas should be listened to and considered. People who express ideas that challenge old methods can lead to breakthroughs and creativity. Here are a few ideas for making sure everyone feels included:<\/p>\n<ul>\n<li>Solicit input from everybody, so you don\u2019t just hear from those that are comfortable speaking up.<\/li>\n<li>Provide mentorship and sponsorship programs for women and other underrepresented groups to help prepare them for advancement<\/li>\n<li>Expand your definition of diversity to include neuro atypical, nonbinary, LGBTQ, religious affiliation, and education level in addition to race and gender.<\/li>\n<li>Make a conscious effort to evaluate performance, not communication or presentation style.<\/li>\n<li><a href=\"https:\/\/blogs.microsoft.com\/blog\/2020\/06\/23\/addressing-racial-injustice\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hold leadership and vendors accountable for diversity metrics<\/a>.<\/li>\n<\/ul>\n<p>As we look past the COVID-19 pandemic, we can expect that cybersecurity challenges will continue to evolve. AI, machine learning, and quantum computing will shape our response, but technology will not be enough. We need creative people to build our products, design our security programs, and respond to threats. We need teams that are diverse as the problems we face.<\/p>\n<p>To learn more about Microsoft Security solutions visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">website.<\/a>&nbsp; Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow\u2019s cyber threats.<br \/>\nThe post Microsoft Security: How to cultivate a diverse cybersecurity team appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36898,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6859,7835,6577,6579,347],"class_list":["post-36897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ai-and-machine-learning","tag-ciso","tag-ciso-series","tag-ciso-series-page","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-31T18:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Security: How to cultivate a diverse cybersecurity team\",\"datePublished\":\"2020-08-31T18:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\"},\"wordCount\":1177,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png\",\"keywords\":[\"AI and machine learning\",\"CISO\",\"CISO series\",\"Ciso series page\",\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\",\"name\":\"Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png\",\"datePublished\":\"2020-08-31T18:00:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png\",\"width\":1024,\"height\":565},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI and machine learning\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/ai-and-machine-learning\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Security: How to cultivate a diverse cybersecurity team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-31T18:00:30+00:00","og_image":[{"width":1024,"height":565,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Security: How to cultivate a diverse cybersecurity team","datePublished":"2020-08-31T18:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/"},"wordCount":1177,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png","keywords":["AI and machine learning","CISO","CISO series","Ciso series page","Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/","name":"Microsoft Security: How to cultivate a diverse cybersecurity team 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png","datePublished":"2020-08-31T18:00:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team.png","width":1024,"height":565},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-how-to-cultivate-a-diverse-cybersecurity-team\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AI and machine learning","item":"https:\/\/www.threatshub.org\/blog\/tag\/ai-and-machine-learning\/"},{"@type":"ListItem","position":3,"name":"Microsoft Security: How to cultivate a diverse cybersecurity team"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36897"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36898"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}