Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

New cyber apprenticeship initiative to develop & train cybersecurity workforce

By Maria Henriquez
hiring-freepik1170x658v567.jpg

Image by mego-studio via Freepik

July 20, 2022

In partnership with the White House and the U.S. Department of Commerce, the Department of Labor (DOL) announced a 120-day Cybersecurity Apprenticeship Sprint to promote the Registered Apprenticeship model as a solution for numerous industries to develop and train a skilled cybersecurity workforce. The Sprint would address the cybersecurity field’s current job openings and longer-term job quality and retention issues. 


In addition, the Sprint seeks to:

  • To increase awareness of current successful Cybersecurity-related Registered Apprenticeship programs, partnerships, and initiatives and how they’re helping industry educate and train a skilled cybersecurity workforce to reduce cybersecurity risk.
  • To advance diversity, equity, inclusion, and accessibility (DEIA) across Cybersecurity occupations through Registered Apprenticeship, especially for historically underrepresented populations such as women and communities of color.
  • To educate the public on the efforts, the Department of Labor’s Office of Apprenticeship is taking to accelerate the process by helping employers to launch programs in as little as 48 hours by using existing industry vetted and DOL-approved standards.
  • To recruit employers to explore Registered Apprenticeship and partner with DOL and the Department of Commerce’s National Initiative for Cybersecurity Education (NICE) to help meet critical Cybersecurity workforce needs of the Nation; and
  • To connect career seekers to Cybersecurity apprenticeship opportunities.


The National Initiative for Cybersecurity Education (NICE) Cybersecurity Apprenticeship Program Finder can help locate Cybersecurity apprenticeship programs, youth apprenticeship programs, and pre-apprenticeship programs throughout the United States, many of which use the NICE Workforce Framework for Cybersecurity (NICE Framework).


Below, security leaders react to the initiative.


Casey Ellis, Founder and CTO at Bugcrowd:

The cybersecurity apprenticeship sprint is a creative initiative that will encourage a swath of new talent into the cybersecurity workforce by bootstrapping highly visible and valuable work experience and by focusing on inclusivity and diversity as a primary objective.

 

Michael DeBolt, Chief Intelligence Officer at Intel 471:

This is a very promising step in the right direction to help both sides of the equation: the busy employer occupied in the fight against cybercrime and the aspiring cyber security professional looking for entry into the profession. All reasonably-minded employers agree that we can only win this fight with fresh, creative minds and diverse backgrounds and perspectives. But this requires investment in time, money, and energy. So often, these resources are directed toward tangible things that provide the clearest, safest, and quickest path for return on investment, such as the newest technology or the proven senior analyst that can hit the ground running.


Employers who’ve invested in hiring and onboarding new employees breaking into the cybersecurity industry have benefited from novel and fresh approaches to bring the fight to the adversary. This apprenticeship initiative will help new employees and make a lasting impact on our ability to fight new cyber threats.

 

Sounil Yu, Chief Information Security Officer at JupiterOne:

Although many cybersecurity workers take pride in their professional status, many of their jobs, as well as the thousands of unfilled cybersecurity jobs, are actually vocational in nature and could be filled by those with the appropriate level of vocational training. In vocational schools, students focus nearly entirely on learning the skills of their trade. In this case, cybersecurity. By immersing themselves in a particular field, like cybersecurity, students practice tangible skills they will need and can apply to the workplace. Furthermore, this period of training can happen at an accelerated pace that produces qualified candidates in one or two years, if not faster.


The critical workforce shortage in cybersecurity continues to threaten our ability to properly defend our digital ecosystem and way of life. Leveraging the successes we have seen in other job markets, we should examine which of our unfilled cybersecurity jobs can be addressed through vocational training and adapt our hiring practices to enable a similar scale to address the shortfalls in the job market. At the same time, we should team up with cybersecurity-focused vocational training and education programs that equip a wider range of job seekers to qualify for these opportunities.


By reexamining some of our traditional cybersecurity roles through the lens of vocational opportunities, we can build a more robust and adaptive workforce that can better defend against today’s complex cybersecurity threats.

 

Joseph Carson, chief security scientist and Advisory CISO at Delinea:

Recent initiatives, including commitments to providing more security awareness training and more cybersecurity jobs, are great. However, we must prioritize what we can do now and what we must do in the near future. We need to fast-track the need for skilled workers in cybersecurity and fast-track them into the industry as the skills shortage is only getting larger.

KEYWORDS: cyber security national security retention risk management security talent

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Department of Defense and National Security Agency announce new cybersecurity initiative aiming to close the cybersecurity talent gap

    See More
  • Systemic-Cyber-Risk-Reduction CISA

    CISA launches new effort to develop actionable metrics to quantify cyber risk

    See More
  • cyber5-900px.jpg

    (ISC)2 Announces New Professional Development Institute to Train Cyber Professionals

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing