Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How higher ed can prepare the next generation of IT

By Mike Arrowsmith
students-higher-ed-freepik1170x658v5.jpg

Image by lookstudio via Freepik

June 21, 2022

High-profile events, including SolarWinds and the Colonial Pipeline attacks, have catapulted cybersecurity and information technology into the limelight. It has captured the attention of organizations and the government alike. In fact, preventing potentially devastating cyberattacks — whether for financial, intellectual property or nation-state secrets — has become a top priority for the Biden administration. 


The Cybersecurity and Infrastructure Security Agency (CISA), for example, has urged U.S. organizations to put their ‘Shields Up’ and the White House requested a budget increase of $10.9 billion for cybersecurity-related spending in 2023. Cybersecurity went from being a tick in the box to becoming an integral part of every organization.


Now the question is — how does higher education support our next generation of cyber warriors? It’s a much needed profession that must incorporate a breadth of general IT skills with specific security training too, but we have a long way to go in attracting and supporting students interested in this career path. Higher education institutions need to be better equipped to defend themselves too. Recently, Lincoln College in Illinois shuttered its doors after 157 years due to the combination of the pandemic and a ransomware attack.


Why Cybersecurity Education Is Needed 

A cyberattack occurs every 39 seconds. This might be the only statistic required to answer the question of why cybersecurity education is needed. But it’s not just the pure volume of attacks; it’s the impact they are having. Last year, a cyber hack led to the largest fuel pipeline in the U.S. being shut down, and fuel shortages across the entire east coast. 


But cybersecurity and IT education can’t only be looked at through the lens of supply and demand to fill these jobs for the public and private sectors. It’s also up to our nation’s college students to seek degrees related to this field. Generally speaking, most students do some background research on the fields they are interested in to see if education in that area is a worthwhile investment. If the field is growing, if it pays well, these are factors that come into play. 


It won’t take much research on cybersecurity to know that, yes, the field is growing much faster than average at 33% between 2020 and 2030, according to the U.S. Department of Labor. And yes, it pays well, with a median pay of $103,590 per year. General STEM degrees seem to follow this growth, as the number of degrees continues to go up yearly. 


With the market and student interest in the right place, the responsibility for cybersecurity education then falls to the higher education institutions themselves. Many schools do offer degrees that prepare our nation’s youth to become software developers and engineers, but few properly prepare students for the cybersecurity component of this field. 


The Current State Cybersecurity and IT in Higher Ed

Now the question is — how are the U.S.’s higher education institutions preparing students for jobs in a field that is expanding exponentially? Unfortunately, not enough colleges and universities are focusing on this growing field. As recently as 2019, only 3% of U.S. Bachelor’s degree graduates had any cybersecurity-related skills. The key here is to understand why this percentage is so low and what we can do about it as an industry. 


Until recently, cybersecurity wasn’t the worry it has quickly become. Add to this that cybersecurity is constantly evolving, with new tools and practices being implemented frequently. This creates a challenge for higher education institutions to develop a curriculum around cybersecurity and prepare the next generation of IT professionals. 


Tactics to Prepare the Next Generation of IT 

As colleges update their curriculum and add cybersecurity training and degrees, here are some tactics they should implement to truly and properly prepare students to be professionals in this field:

  1. Adjusting Academia: As we teach students how to write and deploy code, we need to teach them how to do so securely. So much of the code being pushed today is insecure, laying the groundwork for attacks and breaches to happen with great frequency. A huge step to improving this is to code securely from the start. This is an essential piece of any software-related degree today. Moreover, cybersecurity should be an element of any business degree — everyone needs to know the basics. 
  2. Hands-On Experience: Colleges and universities can put together lab environments for students where they learn to collect data, conduct forensics, and remediate flaws. These labs need to offer real cybersecurity tools and solutions, from those that scan for vulnerabilities to those that manage patch management. Nothing can prepare a student like real-world experience. Cybersecurity labs that leverage real tools and real flaws are needed so students can take what they learn in the classroom and apply it. 
  3. Partner with Leading Cyber Firms: There are hundreds of cybersecurity firms in the U.S. alone. Colleges and universities can look to partner with these organizations, providing internship/college credit experiences that give students a real look at a day in the life and further their hands-on experience.


The state of cybersecurity in our country is changing rapidly. The need to prioritize cybersecurity emerged quickly, and it will take some time before we have the supply of professionals, methodologies, and tools, to meet this challenge head on. A critical component of improving cybersecurity in the U.S. belongs to higher education institutions, which must prepare the next generation of IT and cybersecurity professionals with the education and training necessary to be ready to secure our increasingly connected world. 

KEYWORDS: cyber security higher education information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Arrowsmith is Chief Trust Officer at NinjaOne.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fairfield University cybersecurity master's degree

    Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

    See More
  • cyberwarrior

    How to Foster the Next Generation of Cyber Warriors

    See More
  • hacker hacktivist

    It’s time to prepare for the rise of hacktivism (and its side effects)

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing