HomeCyber BalkansWomen-in-Cyber Training Model SHE@CYBER Expands Beyond EU Funding with New Independent Adoption...

Women-in-Cyber Training Model SHE@CYBER Expands Beyond EU Funding with New Independent Adoption by Countries

Published on

spot_img

Expanding Opportunities: The SHE@CYBER Program Breaks New Ground in Cybersecurity Training

A noteworthy shift is unfolding in cybersecurity training, particularly aimed at women and non-technical entrants, as the SHE@CYBER initiative continues to gain traction beyond its initial funding phase. Developed collaboratively with contributions from ISACA, this program is setting a precedent for widening access to cybersecurity professions. Following the expiration of its Erasmus+ project funding in November 2025, SHE@CYBER has seen enthusiastic adoption in countries like Poland and North Macedonia, allowing the program to flourish independently of EU funding.

Since the completion of its funded phase, SHE@CYBER has successfully trained over 70 women in Poland, empowering them to participate in the cybersecurity landscape without the need for ongoing financial support from external funding. Additionally, the program’s success is evident in North Macedonia, where more than 40 educators have been certified to deliver the training. This voluntary uptake, occurring after the cessation of grant money, is a compelling indication that the model operates effectively on its own merits.

Throughout its funded phase, which launched in 2024, the training program demonstrated significant accomplishments. It successfully trained 45 trainers across various European countries, including Cyprus, Spain, Italy, Greece, and Ireland. More than 193 registered users accessed the program through its open-access platform, highlighting its reach and effectiveness. The positive reception culminated in an independent evaluation by the Cyprus National Agency, which operates under the auspices of the European Commission’s Erasmus+ program. This assessment awarded the program an impressive score of 90 out of 100, designating it as “Excellent Quality” and recognizing it as a “European Good Practice.” Furthermore, SHE@CYBER earned a finalist position in the 2025 European Digital Skills Awards, further solidifying its reputation in the sector.

Central to the program’s design is a research-informed approach that examines the reasons behind the underrepresentation of women in cybersecurity and how traditional skills frameworks often contribute to this disparity. ISACA played a key role by adapting recognized global frameworks to suit individuals lacking a technical background. By correlating the curriculum with the European Cybersecurity Skills Framework (ECSF), the program enables learners to develop industry-recognized skills from the outset, thus facilitating entry into the field.

Professor Vladlena Benson, who serves as the Academic and Research Liaison at ISACA and directs the Aston Centre for Cyber Security Innovation at Aston University, emphasizes the need for such initiatives. She states, “Women are underrepresented in cybersecurity not due to a lack of ability, but often because of how the profession defines itself and communicates its entry pathways.” This statement underscores the program’s goal: by merging foundational technical skills with confidence-building and professional development, SHE@CYBER cultivates a more approachable and inclusive pathway into cybersecurity careers.

One of the program’s standout features is its train-the-trainer model, which is pivotal to its scalability. Instead of depending on a centralized delivery team, SHE@CYBER certifies educators to independently impart the training methodology. This approach not only creates a multiplier effect—ensuring the program’s continued reach to future cohorts—but also reduces reliance on additional resources. The adoption of the program in North Macedonia serves as a prime example of this effective scaling model.

Chris Dimitriadis, ISACA’s Chief Global Strategy Officer, has lauded the program’s impact, stating, “SHE@CYBER shows that when training is grounded in real-world needs and supported by recognized standards, it becomes both credible and inclusive. That combination is what building a stronger cybersecurity workforce actually requires.” His perspective highlights the need for training programs that are not only educational but also relevant to today’s job market.

Looking ahead, the SHE@CYBER platform and its learning materials will remain accessible at no cost until at least November 2028, ensuring that the opportunity for education in cybersecurity continues to be available for those eager to enter the field.

This initiative aligns closely with ISACA’s SheLeadsTech program, which seeks to enhance the representation of women in the tech workforce and elevate them into leadership roles. As SHE@CYBER gains further recognition and adoption across various regions, it heralds a new era for diversity and inclusivity within the cybersecurity domain, spotlighting the importance of accessible and equitable training pathways.

The implications of such a program extend beyond individual participants, shaping a more resilient cybersecurity workforce that is reflective of diverse experiences and perspectives. With its success thus far, SHE@CYBER is poised to remain at the forefront of transformative training in the cybersecurity industry.

Source link

Latest articles

Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE

Vulnerability in Cisco’s Cloud Service Highlights Importance of Identity and Access Management In a recent...

Cargo Theft by Hackers Involves Sophisticated Remote Access Campaigns, Researchers Discover

In a compelling disclosure, security researchers at Proofpoint have highlighted the alarming activities of...

APK Malformation Detected in Thousands of Android Malware Samples

APK Malformation Emerges as a Key Evasion Technique in Android Malware The landscape of Android...

More like this

Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE

Vulnerability in Cisco’s Cloud Service Highlights Importance of Identity and Access Management In a recent...

Cargo Theft by Hackers Involves Sophisticated Remote Access Campaigns, Researchers Discover

In a compelling disclosure, security researchers at Proofpoint have highlighted the alarming activities of...