A List of Female Cybersecurity Content Creators

Helen Patton
3 min readJan 15, 2024

For your 2024 list

I read a lot of cybersecurity books and papers, and listen to a lot of podcasts. Reflecting the diversity of the industry, most of the content I consume is created by men. This year, I want to diversify my consumption, so I asked my social media contacts for their recommendations for books, papers or podcasts created by women.

Dall-E strikes again… :)

I had a great friend and colleague ask me why I wanted to make non-male content creators my focus, which was a valid question. After all, the content I was already consuming continues to be high quality, and worth reading. The thing is, often men’s content is shared with the baseline assumption that it is the norm, and anything created by diverse creators is “the other”. Something to be consumed AFTER the normal stuff is done. An optional read. Worse, we acknowledge that male content might not be great, but give them the benefit of the doubt — give it a listen, just try it. For diverse creators, however, often the assumption is that the work must be judged worthy BEFORE we try it.

So here are a list (and by no means all of them) of books, blogs and podcasts created by women, recommended by my community, that I will be choosing to read this year. Many of these creators are also great public speakers, and are available for conferences, company events and academic speaking engagements. I encourage you to select at least a couple to add to your reading list. I haven’t read them yet… I look forward to your reviews.


Elizabeth Anderson: Private Government: How Employers Rule Our Lives (And Why We Don’t Talk About It)

Jessica Barker MBE PhD: Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career. Also Hacked: the secrets behind cyber attacks

Jennifer Bayuk: Preorder Stepping Through Cybersecurity Risk Management

Black Women in Cyber Collective: Securing our Future: Embracing the Resilience and Brilliance of Black Women in Cyber

Stephanie and Chris Domas: x86 Software Reverse-Engineering, Cracking, and Counter-Measures (Tech Today)

April Falcon Doss: Cyber Privacy: Who Has Your Data and Why You Should Care



Helen Patton

Cyber Security, Technology Ethics, and Humanity. What else? I can be found at CISOHelen.com or on Twitter @CisoHelen or on Mastodon @cisohelen@infosec.exchange