Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySectorsCybersecurity NewsGovernment: Federal, State and Local

How Florida Agencies are Training for a Cyber Talent Pipeline

A new partnership in Florida strives to foster cybersecurity talent in state agencies through ongoing education and hands-on training

By Claire Meyer
Wesley Bull - Security Magazine

At a minimum, all Florida state agencies in the executive branch (such as the Department of Education or the Department of Transportation) have at least one IT security professional eligible to attend cybersecurity education sessions provided through the Florida Agency for State Technology and the University of West Florida’s Center for Cybersecurity. The first stage of the program aims to get all agencies using the same language and frameworks, as well as covering core subjects like data breach reporting and notification. Photos courtesy of the Florida Agency of State Technology

June 8, 2018

Governments are no stranger to budgetary challenges, and that extends to employee salaries, including IT security employees. With 11,000 IT and cybersecurity jobs currently unfilled in the state of Florida and state government agencies facing a very competitive talent market, the University of West Florida Center for Cybersecurity and the Florida Agency for State Technology (AST) have tackled the issue aggressively on their own and teamed up to build a pipeline of talented, trained cyber professionals who can support the state’s cyber resiliency and data security.

The AST oversees IT and cybersecurity for Florida state agencies, including the Department of Transportation, Department of State and Department of Transportation. The program unifies the jargon that each state department uses for IT security through the NIST Cybersecurity Framework, making it easier for agencies to share intelligence and information, says Eric Larson, Executive Director of the Florida AST and Florida State Chief Information Officer.

Eric Larson, Executive Director of the Florida AST and Florida State Chief Information Officer - Security Magazine

“The goal is to create an environment where we can have a pipeline building qualified staff, not only within AST but within other agencies,” says Eric Larson, Executive Director of the Florida AST and Florida State Chief Information Officer. Photo courtesy of the Florida Agency of State Technology

In addition to streamlining communication, the program’s first stage is to improve cybersecurity awareness across all state agencies.

“The obvious benefit for state personnel is to be more cyber aware so we can react when a cyber incident occurs,” Larson says. “Being able to act immediately and effectively can directly affect the outcomes of a cyberattack.”

According to Dr. Eman El-Sheikh, Director of the University of West Florida (UWF) Center for Cybersecurity, the program covers core concepts, such as vulnerability analysis, risk management and reporting. Moving forward, more specialized training will be offered, including courses tailored for specific work roles relevant to improving Florida’s security and resilience, such as cybersecurity incident management, network defense, operating system hardening, secure software development, cloud security and more.

“It’s important that we start with the first phase of our partnership with AST to really develop a culture of cybersecurity across the state,” El-Sheikh says. “The first phase really focused on how we can get everybody to know the core cybersecurity fundamentals and how we make sure that people who might think cybersecurity isn’t important to them know that there are core vulnerabilities or risks that may impact them.”

The partnership also includes training with the Florida Cyber Range, a sophisticated simulation system created though a UWF Center for Cybersecurity and Metova CyberCENTS partnership, so state cybersecurity professionals can get hands-on training within the program instead of waiting for a real-life incident. The system can emulate a state agency’s internal system or even the whole Internet, injecting simulated vulnerabilities or attacks to give employees more experience without threatening live systems.

UWF Center for Cybersecurity Director Dr. Eman El-Sheikh - Security Magazine

The program “provides that culture of continuous learning and collaborating, and it brings agencies together to collaborate, share expertise and resources, and advance cybersecurity resiliency for the state,” says UWF Center for Cybersecurity Director Dr. Eman El-Sheikh. Photo courtesy of the University of West Florida

“In cybersecurity, the hands-on skills tend to be the number one factor to deterring threats, mitigating threats as well as for developing workforce and getting people into jobs,” El-Sheikh says.

UWF has myriad resources to contribute to the partnership and the new curriculum, especially since the Center for Cybersecurity is designated as a National Center of Academic Excellence by the NSA and DHS, and it serves as the NSA/DHS Cybersecurity Regional Resource Center for the Southeast U.S. Within that role, UWF aims to advance cybersecurity education, research and workforce development in the region.

The workforce development factor for this program is essential, says Larson. “The problem in state government is, given the salaries that are available, it’s very challenging to hire qualified security staff within our budget,” he says. “Even as people get trained and become qualified, it’s expensive and challenging to retain them as they achieve higher skills. The goal is to create an environment where we can have a pipeline building qualified staff, not only within AST but within other agencies, so when the good people go on to greener pastures, we have an environment that constantly trains new people to address the threats.”

The variety of coursework available also helps security professionals continue their training at their current skill level, Larson adds. “By building a partnership with the University of West Florida, we allow the state to embed the entire cybersecurity curriculum into the state’s IT security departments. UWF has a lot of course material online, so no matter where someone is in their competency for security, we can meet them with an appropriate level of training, so we’re not always covering the basics and ignoring the third of your employees who are beyond that.”

Feedback has generally been positive so far. Training started in late March 2018, and according to Larson, there is a waiting list for state employees to get into upcoming training sessions.

The training can also be spaced out throughout the year, so it can fit into security professionals’ schedules as their working arrangements permit.

While developing the program, Larson and El-Sheikh discovered that there weren’t many other examples of similar partnerships to build off of, so their departments are working to build out a pilot program that other states and higher education systems can deploy.

In addition to improving the state’s resiliency against cyberattacks, the program will help keep Floridians’ information in those key state agencies secure, El-Sheikh says. The program “builds cybersecurity culture from within, making sure that current personnel have the proper knowledge, skills and training to ensure their jobs are done correctly – being able to detect breaches, being able to respond to breaches, to report and identify and manage those breaches as efficiently as possible,” she adds. “It provides that culture of continuous learning and collaborating, and it brings agencies together to collaborate, share expertise and resources, and advance cybersecurity resiliency for the state.”

KEYWORDS: cyber security awareness cyber security education cyber talent gap government cyber security profile in excellence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber responsive default

    MasterCard, Microsoft Team with Federal Agencies and Nonprofit to Launch Cyber Talent Initiative

    See More
  • training-skills-freepik1170x658v536.jpg

    The cybersecurity skills gap highlights the need for cyber-awareness training

    See More
  • merger-enews

    Q&A: How Are Cyber Risks Changing Mergers & Acquisitions?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing