{"id":18848,"date":"2021-07-20T16:44:14","date_gmt":"2021-07-20T16:44:14","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18848"},"modified":"2021-07-20T17:12:27","modified_gmt":"2021-07-20T17:12:27","slug":"finding-cybersecurity-talent-alan-paller","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/","title":{"rendered":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller"},"content":{"rendered":"<p>A group of technology luminaries have launched an effort to find and train a new generation of cybersecurity talent, an effort that will gain steam tomorrow with <a href=\"https:\/\/www.cybertalentinstitute.org\" target=\"_blank\" rel=\"noopener\">The Cyber Talent CIO Forum<\/a>. The event is free and open to the public, and that&#8217;s central to the group&#8217;s goal, which is to find talent in new places through alliances with schools, state governments and others.<\/p>\n<p>We sat down to talk with Alan Paller, founder of SANS and the SANS Technology Institute and president of the Cyber Talent Institute, to discuss the event and the group&#8217;s goal, which is to \u201cdiscover and train a diverse new generation of 25,000 cyber stars by the year 2025.\u201d<\/p>\n<p>At a time when <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-employment-2021\/\">cybersecurity job openings<\/a> number in the millions and major cyber attacks are an almost daily occurrence, finding people to fill those roles has become a matter of national security. The Cyber Talent Institute has developed a fun and effective game model that can help find and develop that talent while also expanding diversity and opportunity in the tech industry.<\/p>\n<p>Here\u2019s the bulk of our conversation with Alan Paller.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> Tell us about the Cyber Talent Institute and how it came to be.<\/em><\/p>\n<p><strong>Alan Paller: <\/strong>You do know about SANS, so you know that SANS trains more than 50,000 people a year. But what SANS doesn\u2019t do is find the talent early. SANS is an organization that finds people who are already in the field and makes them better.<\/p>\n<p>What CTI is doing is going down a step in the pipeline, to the students, to find the talent earlier, so that we don\u2019t lose them. Because the way the education system works, only a few people seem to go into cybersecurity. We wanted to change that.<\/p>\n<p>You did an <a href=\"https:\/\/www.baselinemag.com\/security\/finding-cybersecurity-talent-train-invest.html\" target=\"_blank\" rel=\"noopener\">article<\/a> earlier this month about looking in different places for talent, looking for people who are already working. That\u2019s the purpose of CTI. To reach out to students. It\u2019s to go beyond the pipeline that we automatically come into cybersecurity through math, computer science, and networking and open the funnel much wider. Find people who have not already found technology, but who have three characteristics that seem to make superstars \u2014 tenacity, curiosity, and love of learning new things. They don\u2019t mind being faced with new problems. They like them. And what the game does is find those people. So CTI is just moving to earlier in the pipeline.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> Through the years, Russia has produced more IT professionals than the United States. What should the roles be of the government and the public sector in discovering and developing future talent?<\/em><\/p>\n<p><strong>AP:<\/strong> The government has two big roles. One is to be a welcome employer, to welcome this talent when it\u2019s found. But more importantly, reaching out to the schools, the teachers, and the students. It\u2019s very challenging for a private organization to do. We\u2019re doing it as well as we can. But the government has much better outreach to students.<\/p>\n<p>We found wonderful partnerships with state governments like Texas, New Jersey, and a bunch of other states, where they\u2019re reaching out to the schools and the students, and let students give this game a try. Because they probably have talent and you\u2019ve never noticed the talent because you don\u2019t have other programs to find it. So, the state governments have been wonderful. We think that if the federal government does it, it would work even better.<\/p>\n<p>There\u2019s a model in the United Kingdom called <a href=\"https:\/\/joincyberdiscovery.com\" target=\"_blank\" rel=\"noopener\">Her Majesty\u2019s Government Cyber Discovery Programme<\/a>, where the government reached out and they found 250,000 students to try the game. We\u2019re hoping that other countries, particularly the United States, will have a similar program. But right now, it\u2019s working fine. We have 29,000 students playing the game this past year without any government support. So we\u2019re on our way.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> Can you tell us about the game and how it helps you resolve the talent shortage?<\/em><\/p>\n<p><strong>AP:<\/strong> That was the magic. It was developed by one of the top cybersecurity people in the UK, by a man named <a href=\"https:\/\/www.jameslyne.com\" target=\"_blank\" rel=\"noopener\">James Lyne<\/a>.<\/p>\n<p>He was asked by the government to find a way to identify people like him. What he did is he built no training, but just challenges. He made it a game, in the sense that each player is a member of a cyber protection team. They have a field guide that they can go to for information, and then they are given realistic challenges.<\/p>\n<p>So a message just came in, you found it, but it doesn\u2019t seem to make any sense. It might be in code. Can you crack the code and find out what that message says these people are trying to do? And they don\u2019t know anything about code-breaking. But in the field guide, there are some pointers to places where they can learn more. There are some examples of different kinds of ciphers. If they are the kind of person we\u2019re looking for, who loves to learn new things and loves the challenge, they dig in and try different ciphers until they find out that, if I use the Caesar cipher, I can crack this.<\/p>\n<p>But it\u2019s a discovery process. It\u2019s not something where they already know it at the start. We are looking for people who want to discover how to solve a problem. Not for people who come in having been taught to solve the problem. Because cyber problems aren\u2019t old. They\u2019re all new. And if you want to use yesterday\u2019s solution on today\u2019s problem, you\u2019re probably not going to be successful.<\/p>\n<p><strong><em>KR: <\/em><\/strong><em>How do you bring this approach to the people, to the grassroots, to the schools?<\/em><\/p>\n<p><strong>AP:<\/strong> We started by connecting with all of the teachers who teach technology classes \u2014 people who teach computer science, networking, and STEM information classes. We invited them to have their students try the game. And they did, and the students had such a good time that they invited others.<\/p>\n<p>Like there\u2019s a teacher in Spotsylvania, Virginia, who showed 12 of her girls how to play the game. They had such fun that they went out to get 110 other students from the school to come and play the game as well.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> Do you have partnerships with private organizations for this program?<\/em><\/p>\n<p><strong>AP:<\/strong> We have partnerships with two kinds of organizations. We have a partnership with, well, this whole project is funded by the <a href=\"https:\/\/www.nationalcyberscholarship.org\" target=\"_blank\" rel=\"noopener\">National Cyber Scholarship Foundation<\/a>, which is the sister organization to the CTI. Pretty much all of the resources come from the foundation. And that money goes to set up the game, for the outreach, for the $2 million in scholarships that we gave out in May. And that helps draw students in. Because there are very few high school scholarship programs that will pay $2,500 for their college education. So they like that.<\/p>\n<p>It\u2019s a partnership with the CTI and the National Cyber Scholarship Foundation, and everyone else is just helping.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> I was looking at how community colleges can be tapped by organizations for talent. Are you also reaching out to community colleges?<\/em><\/p>\n<p><strong>AP:<\/strong> Yes, the first one we did was Montgomery College, the largest community college in Maryland. They actually use the game to find students who might be good at cybersecurity. And then they run a special course, like the course that we use in <a href=\"https:\/\/www.nationalcyberscholarship.org\/cyber-foundations-academy\" target=\"_blank\" rel=\"noopener\">Cyber Foundations Academy<\/a> to advance their skills. So, yes, there\u2019s a wonderful partnership here.<\/p>\n<p>What we hope is that they will partner with the kids in high school. Because in community colleges, there are dual enrollment programs, where you can be enrolled in high school but also take college courses.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> Tell us more about the upcoming forum.<\/em><\/p>\n<p><strong>AP:<\/strong> When you asked about partnerships, I almost started there but I did not. I\u2019m glad you\u2019re asking about the forum.<\/p>\n<p>Organizations, like FedEx, Vanguard, and Raytheon, are all helping us because they want to have early access to talent. They don\u2019t want to wait until kids get out of college to begin relationships with students. Those companies and organizations like <a href=\"https:\/\/girlswhocode.com\" target=\"_blank\" rel=\"noopener\">Girls Who Code<\/a>, and other large national organizations are all speaking at the forum in very short sessions about what they\u2019re doing to accelerate this pipeline.<\/p>\n<p>James Lyne, the person who created the game, is going to be telling about the game in the forum as well. So you got the game, the educational development through the Cyber Foundations Academy, and you have all the partner organizations that are interested in having all their members try it.<\/p>\n<p>The corporations will be telling the very innovative things they\u2019ve done. FedEx, in particular, has a wonderful program, where they\u2019ve set up an internship on campus, at the university. It\u2019s not where you leave school and go to work at the company; you go work at the company while you are in school. It\u2019s a part-time job in school, but also you\u2019re starting your career.<\/p>\n<p>We\u2019re hoping that we can show innovation across the pipeline \u2014 that\u2019s an example toward the end. The game has an example toward the beginning. And we\u2019re hoping companies will say they wanted to do some of that. We don\u2019t care which of them they do. We want to just give them new examples of the things that people are doing that they never heard of before and go out and try.<\/p>\n<p>The forum is going to show what a company is already doing to give other companies an idea of models that they might try or they might improve on to accelerate the pipeline, so they don\u2019t have to fight with other companies for talent.<\/p>\n<p><strong><em>KR:<\/em><\/strong><em> What is the most important idea or insight that organizations need to grasp that will lead them to establish a partnership with you?<\/em><\/p>\n<p><strong>AP:<\/strong> The most important idea, I think \u2014 that companies, like FedEx, is doing \u2014 is this: it\u2019s the first time that they have a direct way to reach out early in the education system to accelerate and grow that pipeline. They\u2019re seeing \u2014 and we\u2019re hoping that coming out of it \u2014 that they will reach out to the schools in their area so that they have or they are discovering homegrown talent.<\/p>\n<p>There are two wonderful quotes I have to share. One from a student, and one from a teacher. A teacher in Wyoming said, \u201cBefore I found this game, the students in my class thought that they\u2019re too dumb to do computers, computer science, or cybersecurity. When they played the game, they discovered that they were good at it. And now they\u2019re talking with the counselor about going into computer science.\u201d<\/p>\n<p>The other one came from a quote made during International Women\u2019s Day. A young woman was being interviewed, and she said, \u201cI\u2019m an athlete, I don\u2019t think about computers. If you told me if I was interested in computers two years ago, I would\u2019ve laughed a long time. But I played this game, and I found out it\u2019s exciting. It\u2019s competitive. It\u2019s fun, and I\u2019m good at it. Now I see that this is a field that has nerds in it, who were the people I thought were in cybersecurity&#8230; and they\u2019re athletes.\u201d<\/p>\n<p>There\u2019s room for everybody. That\u2019s the innovation here. It\u2019s not that the game will accelerate bringing the same people who are going to come through anyway. It\u2019s that the game opens the field up. People who never thought they would be good at it at all, discover that they are. Then we can stop this poaching problem because we have enough homegrown talent to fight back against cyber attacks.<\/p>\n<p>There\u2019s a lot more potential for cyber stars than our system has been able to tap. We need real innovation. We need real change in the way we search for that talent and develop that talent if we\u2019re going to catch up with Russia and China. And that\u2019s what this program is all about \u2014 to reach out to every single person who might have any chance of being good at it and give them the chance to play the game. If they don\u2019t like it, for fifteen minutes, they\u2019re not going to waste any of their time or throw away resources. We need to get to a million more people literally. That\u2019s what we\u2019re about.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fd1b925d2-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fd1b925d2\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fd1b925d2\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fd1b925d2\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fd1b925d2\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fd1b925d2\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fd1b925d2\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A group of technology luminaries have launched an effort to find and train a new generation of cybersecurity talent, an effort that will gain steam tomorrow with The Cyber Talent CIO Forum. The event is free and open to the public, and that&#8217;s central to the group&#8217;s goal, which is to find talent in new [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":18850,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[31618],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[143,519],"class_list":["post-18848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cybersecurity-training","b2b_audience-awareness-and-consideration","b2b_product-security","b2b_product-security-training-certifications"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T16:44:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-20T17:12:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvene Requiroso\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvene Requiroso\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\"},\"author\":{\"name\":\"Kelvene Requiroso\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/24349ee6688e0d66a6ec42903afb8493\"},\"headline\":\"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller\",\"datePublished\":\"2021-07-20T16:44:14+00:00\",\"dateModified\":\"2021-07-20T17:12:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\"},\"wordCount\":2116,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg\",\"keywords\":[\"cybersecurity training\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\",\"name\":\"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg\",\"datePublished\":\"2021-07-20T16:44:14+00:00\",\"dateModified\":\"2021-07-20T17:12:27+00:00\",\"description\":\"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg\",\"width\":1200,\"height\":801,\"caption\":\"cyber training\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/24349ee6688e0d66a6ec42903afb8493\",\"name\":\"Kelvene Requiroso\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/60ff0062a79175f1fbd597f6b39e9d71?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/60ff0062a79175f1fbd597f6b39e9d71?s=96&d=blank&r=g\",\"caption\":\"Kelvene Requiroso\"},\"url\":\"https:\/\/www.esecurityplanet.com\/author\/krequiroso\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet","description":"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/","og_locale":"en_US","og_type":"article","og_title":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet","og_description":"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/","og_site_name":"eSecurity Planet","article_published_time":"2021-07-20T16:44:14+00:00","article_modified_time":"2021-07-20T17:12:27+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg","type":"image\/jpeg"}],"author":"Kelvene Requiroso","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kelvene Requiroso","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/"},"author":{"name":"Kelvene Requiroso","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/24349ee6688e0d66a6ec42903afb8493"},"headline":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller","datePublished":"2021-07-20T16:44:14+00:00","dateModified":"2021-07-20T17:12:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/"},"wordCount":2116,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg","keywords":["cybersecurity training"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/","url":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/","name":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg","datePublished":"2021-07-20T16:44:14+00:00","dateModified":"2021-07-20T17:12:27+00:00","description":"The SANS founder has launched a new organization to find cybersecurity talent in high schools and community colleges through games.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/youngwomantech.jpg","width":1200,"height":801,"caption":"cyber training"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/24349ee6688e0d66a6ec42903afb8493","name":"Kelvene Requiroso","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/60ff0062a79175f1fbd597f6b39e9d71?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60ff0062a79175f1fbd597f6b39e9d71?s=96&d=blank&r=g","caption":"Kelvene Requiroso"},"url":"https:\/\/www.esecurityplanet.com\/author\/krequiroso\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18848"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18848"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18848\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18850"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18848"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18848"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18848"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}