Events , Leadership & Executive Communication , Recruitment & Reskilling Strategy

The Path to a More Inclusive, Diverse Cyber Workforce

Michael Cunningham of Graphic Packaging International on Advancing the Workplace
Michael Cunningham, vice president and CISO, Graphic Packaging International LLC

To advance a more inclusive and diverse workforce in cybersecurity, it is imperative to consider "every person in the room," says Michael Cunningham, vice president and CISO of Graphic Packaging International LLC.

See Also: How ISACA Is Guiding Enterprises to Cybersecurity Maturity

"That means the introvert. Maybe they’re just not as confident in speaking up. … Or looking at someone who is different from you. Taking all views in," he says.

According to Cunningham, inclusion involves being receptive to diversity, "but it also mean inspiring others."

In a video interview with Information Security Media Group at RSA Conference 2022, Cunningham also discusses:

  • The state of diversity and inclusion in cybersecurity today;
  • Ways for organizations to become more inclusive and diverse;
  • His own career journey.

Cunningham has 20 years of dedicated cybersecurity experience, with a cumulative total of $220 million in cybersecurity investments, inclusive to four Fortune 50 organizations.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.