Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How higher ed can prepare the next generation of IT

By Mike Arrowsmith
students-higher-ed-freepik1170x658v5.jpg

Image by lookstudio via Freepik

June 21, 2022

High-profile events, including SolarWinds and the Colonial Pipeline attacks, have catapulted cybersecurity and information technology into the limelight. It has captured the attention of organizations and the government alike. In fact, preventing potentially devastating cyberattacks — whether for financial, intellectual property or nation-state secrets — has become a top priority for the Biden administration. 


The Cybersecurity and Infrastructure Security Agency (CISA), for example, has urged U.S. organizations to put their ‘Shields Up’ and the White House requested a budget increase of $10.9 billion for cybersecurity-related spending in 2023. Cybersecurity went from being a tick in the box to becoming an integral part of every organization.


Now the question is — how does higher education support our next generation of cyber warriors? It’s a much needed profession that must incorporate a breadth of general IT skills with specific security training too, but we have a long way to go in attracting and supporting students interested in this career path. Higher education institutions need to be better equipped to defend themselves too. Recently, Lincoln College in Illinois shuttered its doors after 157 years due to the combination of the pandemic and a ransomware attack.


Why Cybersecurity Education Is Needed 

A cyberattack occurs every 39 seconds. This might be the only statistic required to answer the question of why cybersecurity education is needed. But it’s not just the pure volume of attacks; it’s the impact they are having. Last year, a cyber hack led to the largest fuel pipeline in the U.S. being shut down, and fuel shortages across the entire east coast. 


But cybersecurity and IT education can’t only be looked at through the lens of supply and demand to fill these jobs for the public and private sectors. It’s also up to our nation’s college students to seek degrees related to this field. Generally speaking, most students do some background research on the fields they are interested in to see if education in that area is a worthwhile investment. If the field is growing, if it pays well, these are factors that come into play. 


It won’t take much research on cybersecurity to know that, yes, the field is growing much faster than average at 33% between 2020 and 2030, according to the U.S. Department of Labor. And yes, it pays well, with a median pay of $103,590 per year. General STEM degrees seem to follow this growth, as the number of degrees continues to go up yearly. 


With the market and student interest in the right place, the responsibility for cybersecurity education then falls to the higher education institutions themselves. Many schools do offer degrees that prepare our nation’s youth to become software developers and engineers, but few properly prepare students for the cybersecurity component of this field. 


The Current State Cybersecurity and IT in Higher Ed

Now the question is — how are the U.S.’s higher education institutions preparing students for jobs in a field that is expanding exponentially? Unfortunately, not enough colleges and universities are focusing on this growing field. As recently as 2019, only 3% of U.S. Bachelor’s degree graduates had any cybersecurity-related skills. The key here is to understand why this percentage is so low and what we can do about it as an industry. 


Until recently, cybersecurity wasn’t the worry it has quickly become. Add to this that cybersecurity is constantly evolving, with new tools and practices being implemented frequently. This creates a challenge for higher education institutions to develop a curriculum around cybersecurity and prepare the next generation of IT professionals. 


Tactics to Prepare the Next Generation of IT 

As colleges update their curriculum and add cybersecurity training and degrees, here are some tactics they should implement to truly and properly prepare students to be professionals in this field:

  1. Adjusting Academia: As we teach students how to write and deploy code, we need to teach them how to do so securely. So much of the code being pushed today is insecure, laying the groundwork for attacks and breaches to happen with great frequency. A huge step to improving this is to code securely from the start. This is an essential piece of any software-related degree today. Moreover, cybersecurity should be an element of any business degree — everyone needs to know the basics. 
  2. Hands-On Experience: Colleges and universities can put together lab environments for students where they learn to collect data, conduct forensics, and remediate flaws. These labs need to offer real cybersecurity tools and solutions, from those that scan for vulnerabilities to those that manage patch management. Nothing can prepare a student like real-world experience. Cybersecurity labs that leverage real tools and real flaws are needed so students can take what they learn in the classroom and apply it. 
  3. Partner with Leading Cyber Firms: There are hundreds of cybersecurity firms in the U.S. alone. Colleges and universities can look to partner with these organizations, providing internship/college credit experiences that give students a real look at a day in the life and further their hands-on experience.


The state of cybersecurity in our country is changing rapidly. The need to prioritize cybersecurity emerged quickly, and it will take some time before we have the supply of professionals, methodologies, and tools, to meet this challenge head on. A critical component of improving cybersecurity in the U.S. belongs to higher education institutions, which must prepare the next generation of IT and cybersecurity professionals with the education and training necessary to be ready to secure our increasingly connected world. 

KEYWORDS: cyber security higher education information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Arrowsmith is Chief Trust Officer at NinjaOne.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Fairfield University cybersecurity master's degree

    Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

    See More
  • cyberwarrior

    How to Foster the Next Generation of Cyber Warriors

    See More
  • hacker hacktivist

    It’s time to prepare for the rise of hacktivism (and its side effects)

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing