New online program seeks to interest girls in cybersecruity |

New online program seeks to interest girls in cybersecruity

Deb Erdley
Eyes go everywhere in the world of cybersecurity.

Pennsylvania is among 27 states participating in a new effort to bridge the gender gap in cyber security.

The free online program, Girls Go CyberStart, seeks to engage girls in grades 9-12 in the world of cybersecurity, where women make up 20 percent of the workforce in a growing industry, according to figures from Cybersecurity Ventures. The Long Island, N.Y.-based company predicts there will be 3.5 million cybersecurity job openings by 2021.

The Girls Go CyberStart program, a partnership that includes 27 governors and the SANS Institute, launched Tuesday.

A spokesman for the SANS Institute said the interactive program consists of three stages, with each stage featuring a series of digital challenges designed to teach players important concepts in the field of cybersecurity.

Upon registration players will be sent a link to the first stage, CyberStart Assess, which consists of a series of questions that measure existing knowledge, problem-solving skills, and the potential for a career in cybersecurity.

To progress to the next two stages of the program, CyberStart Game and CyberStart Complete, participants must be registered with a “club,” which can be easily set up by a school teacher, administrator or equivalent.

CyberStart Game involves learning cybersecurity techniques to tackle real-world challenges including cracking codes, finding security flaws and dissecting a cyber criminal’s digital trail. Finally, CyberStart Compete is for the best performing teams from each participating state, and will see them compete in a national online “Capture the Flag” competition.

“This is an exciting time to launch the program, cybersecurity is becoming ever more important in this country and by educating young people, we can ensure the industry has a stream of diverse new talent,” said Alan Paller, director of research at the SANS Institute.

Students, teachers, or administrators associated with a school or organization, can register for the program at

Editor’s note: This story was amended on April 1, 2019, to update figures provided by Cybersecurity Ventures.

Deb Erdley is a Tribune-Review staff writer. You can contact Deb at 724-850-1209, [email protected] or via Twitter .

Categories: News | Pennsylvania
TribLIVE commenting policy

You are solely responsible for your comments and by using you agree to our Terms of Service.

We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.

While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.

We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers

We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.

We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.

We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.

We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.