Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

CYBER.ORG launches K-12 HBCU feeder program to grow and diversify the national cybersecurity workforce

school freepik

<a href='https://www.freepik.com/photos/background'>Background photo created by tirachard - www.freepik.com</a>

April 29, 2021

CYBER.ORG announced the kickoff of a new pilot program created to recruit a diverse body of K-12 students to pursue undergraduate cybersecurity degrees and bolster the U.S. cybersecurity workforce. Through a $250,000 grant provided by the National Security Agency (NSA), CYBER.ORG will develop a K-12 feeder program for Grambling State University (GSU) in Northern Louisiana, a Historically Black College and University (HBCU) and the first university in the state to create a cybersecurity undergraduate degree. The goal is to replicate this model between school districts and HBCU’s across the country.

This project aims to address the lack of diversity in the cybersecurity workforce, which is due uneven and unequal access to K-12 cybersecurity education. A recent EducationWeek study revealed students in small and high-poverty school districts are significantly less likely to be exposed to cybersecurity education, resulting in lower-income and minority students having significantly less entrance to this critical field of study.

CYBER.ORG will integrate its state approved curricula into both Huntington High School and Southwood High School’s course offerings to raise students’ foundational and technical skills in cybersecurity and increase interest in GSU's freshmen enrollment, specifically in cybersecurity. CYBER.ORG has also hired veteran educator Willie Henderson as a Cyber Education Specialist to support teachers across the district with CYBER.ORG professional development.

“There is an urgent need to solve the cybersecurity workforce gap, but a problem of this scale requires an innovative approach to recruiting and training future cybersecurity professionals of diverse backgrounds,” said Kevin Nolten, Director of Academic Outreach at CYBER.ORG. “This program harnesses the power of both the high school and university community to provide students with the support they need to succeed in cybersecurity careers. We’re proud to kickoff of this effort and look forward to partnering with other HBCUs around the country to grow the cybersecurity talent pipeline in communities across the country.”

As the leading provider of K-12 cybersecurity education, CYBER.ORG implements programs that encourage students of all backgrounds to pursue cybersecurity in order to fill the global cybersecurity workforce shortage, which is projected to reach 1.8 million unfilled positions by 2022.

“Our partnership with CYBER.ORG will be central to introducing more students at the high school level to the possibility of pursuing cybersecurity degrees and careers,” said Grambling State University President, Rick Gallot. “This initiative is critical to ensuring that all students regardless of race, gender or socioeconomic status have equal opportunity to enter the cybersecurity field. We’re confident that other HBCUs and universities around the country will implement similar models with their own regional high schools.”

“Currently less than half of all school classrooms across the U.S. offer cybersecurity education,” said Dr. Lamar Goree, Caddo Parish School Superintendent. “This partnership will be critical to changing that statistic and ensuring that our high school students can pursue cybersecurity degrees and careers. Our partnership with Grambling State and CYBER.ORG is a wonderful investment in our students’ futures.”

CYBER.ORG is currently seeking additional HBCU partners to participate in similar pilot programs to be replicated across the country. To learn more about how to get involved, visit: www.cyber.org/hbcu

KEYWORDS: cyber security diversity in security k-12 security University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • college students

    CYBER.ORG expands CISA-funded HBCU feeder program

    See More
  • students-freepik

    CYBER.ORG releases first national K-12 cybersecurity learning standards

    See More
  • cyber freepik

    K-12 cybersecurity education is the key to solving our national cybersecurity crisis

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing