{"id":145767,"date":"2022-09-06T15:25:42","date_gmt":"2022-09-06T20:25:42","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/09\/addressing-the-cybersecurity-talent-gap-new-programs-from-isc2"},"modified":"2022-09-06T15:25:42","modified_gmt":"2022-09-06T20:25:42","slug":"addressing-the-cybersecurity-talent-gap-new-programs-from-isc2","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/09\/addressing-the-cybersecurity-talent-gap-new-programs-from-isc2","title":{"rendered":"Addressing the cybersecurity talent gap: New programs from (ISC)2"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/addressing-the-cybersecurity-talent-gap-new-programs-from-isc2.jpg\"><\/a><\/p>\n<p><em>Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! <a href=\"https:\/\/transform.venturebeat.com\/agenda?utm_source=vb&utm_medium=boiler&utm_content=ondemand&utm_campaign=BoilerPlates\">Watch here<\/a>.<\/em><\/p>\n<p>Cyberattacks, breaches, hacks and ransomware are on the rise \u2014 that should come as no news.<\/p>\n<p>And, according to many experts, one of the significant reasons behind this is a long-lamented <a href=\"https:\/\/venturebeat.com\/security\/isc2-cybersecurity-skills-gap\/\">cybersecurity talent<\/a> shortage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here. Cyberattacks, breaches, hacks and ransomware are on the rise \u2014 that should come as no news. And, according to many experts, one of the significant reasons behind this is a long-lamented cybersecurity talent shortage.<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-145767","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/145767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=145767"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/145767\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=145767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=145767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=145767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}