Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEducation: K-12

K-12 cybersecurity education is the key to solving our national cybersecurity crisis

By Kevin Nolten
cyber freepik
March 22, 2021

The United States is at war in cyberspace. The scope and complexity of nation-state and criminal cyber intrusions has grown tremendously over the past year, leaving the nation to battle not only cyber warfare, but for talent. The SolarWinds attack revealed in December of 2020 was the most extensive cyberattack leveraged against the federal government to date, according to the FBI. Attacks on U.S. and global industry have reached a fever pitch. The COVID-19 pandemic presented tremendous opportunity for IP theft of vaccine information and distribution plans, while local school districts shifting to online learning faced an onslaught of cybersecurity challenges – from Zoombombed classrooms to cyberattacks on schools’ digital architecture. Concurrently, American cities with aging infrastructure became ideal targets for ransomware attacks that left local governments in financial ruin, while many of these incidents could have been prevented through basic cybersecurity hygiene measures and additional cybersecurity personnel.

At the same time, the significant U.S. cybersecurity workforce shortage has put tremendous strain on industry, government, and the global economy, as companies of all sizes and federal, state and local governments struggle to fill open positions in the face of increased threat. The somber reality is that the U.S. is expected to face a shortage of 1.8 million skilled cybersecurity workers by 2022, making educating and empowering the next generation of cybersecurity professionals imperative to our future national and economic security. A recent report by the International Information System Security Certification Consortium, (ISC)² advised that the U.S. cybersecurity workforce must surge by 62 percent to close the skills gap, while nearly 4 million security professionals would need to be added to close the global skills gap.

Though filling the cybersecurity talent pipeline has often been thought of as a longer-term goal for the United States, there is renewed urgency to address the tremendous workforce shortage – and quickly. Recent cyberattacks on U.S. infrastructure continue to serve as warning signs that the cadence of threats has increased tremendously and requires immediate action by both industry and government partners. Solving the cybersecurity workforce and talent shortage requires taking action, starting with the youngest learners in the K-12 educational system.

K-12 educators are the force multipliers when it comes to cybersecurity, as building up their confidence through professional development and awareness also increases student access to cybersecurity education and careers. Empowered teachers play an essential role in empowering students to learn cybersecurity concepts in the classroom and enter the workforce with the knowledge and training required to succeed in the industry.

Introducing students at a young age to cybersecurity concepts has tremendous potential impact on both their knowledge of cybersecurity principles and ultimately their interest in pursuing cybersecurity careers as adults. Seeding student interest in cybersecurity is one of the most critical ways to ensure that everyone has knowledge and understanding of cybersecurity concepts and exposure to career options and the pathways to those careers. This begins by introducing cybersecurity into the classroom as early as kindergarten and continuing throughout grade 12 of high school. Unfortunately, not all students currently have equal access to K-12 cybersecurity education.

In 2019, a report from ProtectWise and Enterprise Strategy Group revealed that only 9% of millennials stated that they were interested in pursuing a cybersecurity career at some point in their lives. This was attributed to a lack of awareness of the options in the cybersecurity field and limited access to cybersecurity curricula. Only 17% of respondents said a family member had worked in the cybersecurity field, while 69% said they had never taken a class in school focused on cybersecurity and 65% said that their school did not offer cybersecurity courses.

According to a 2020 EdWeek report on the state of K-12 cybersecurity education, student knowledge levels of cybersecurity are lower in public schools, and in cybersecurity deserts (communities that lack cybersecurity companies or universities that study or offer coursework on the subject). Student knowledge levels were also lower in higher-poverty districts, where survey respondents reported larger shares of students from low-income families.

This suggests that increasing K-12 cybersecurity education in all regions means advancing knowledge of cybersecurity is even more essential in high-poverty areas, cybersecurity deserts, public schools and with K-12 teachers. This makes increasing teacher professional development around cybersecurity education essential to increasing student cybersecurity exposure.

The K-12 educational skills gap requires a coordinated effort by government, industry and the educational system. Ensuring that every K-12 student has access to cybersecurity education requires that teachers become educated on the tools and available curricula, while government and industry have a responsibility to develop cybersecurity learning standards that can be applied uniformly across grade levels to ensure that all students are receiving the same quality of education.

Efforts to establish national cybersecurity standards are currently underway with input from government, industry and educators. Once implemented in all 50 states, K-12 students around the nation will be learning cybersecurity education under the same criteria, a tremendous feat that will provide educators with the tools they need to ensure equitable access to cybersecurity education – and ultimately cybersecurity careers.

Educational efforts can only go so far without legislative support and significant funding. While school cybersecurity has become a recent focal point over the past year, it is imperative that K-12 cybersecurity education is prioritized both in the classroom and on Capitol Hill. It is important that we establish policies that better support our nation's K-12 teachers and students to prepare and engage a cyber literate workforce – an effort critical to our national security and prosperity.

Addressing the cybersecurity workforce shortage through K-12 cybersecurity means creating a culture of collaboration between industry, government and education. Effective partnership is critical to ensuring that educators are being trained and well-resourced to teach K-12 cybersecurity, and that industry is lending an expert hand to helping lift up the next generation of cybersecurity professionals through internships and training programs. Through both national and state legislative efforts that support the pursuit and implementation of K-12 cybersecurity curriculum around the country, the cybersecurity skills gap can be better addressed.

KEYWORDS: cyber security k-12 security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As the Director of Academic Outreach at CYBER.ORG, Kevin Nolten directs the organization’s programmatic outreach efforts and partnerships with the goal of ensuring that every K-12 student in the U.S. has access to cybersecurity education. In this role, he helps advance CYBER.ORG’s K-12 cyber education program with age-appropriate content that aligns with state standards for education in 27 states and counting. With a background in K-12 administration, Kevin finds special meaning in advancing cyber education nationwide and directly impacting students’ futures.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • school freepik

    CYBER.ORG launches K-12 HBCU feeder program to grow and diversify the national cybersecurity workforce

    See More
  • classroom full of students at desks

    The hidden cost of the cybersecurity deficit in K-12 education

    See More
  • elementary school students on computers

    Setting a national standard for K-12 cybersecurity

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!