Skip to content
ADVERTISEMENT
Sign In
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Events
    • Virtual Events
    • Chronicle On-The-Road
    • Professional Development
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
  • More
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Events
    • Virtual Events
    • Chronicle On-The-Road
    • Professional Development
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
    Upcoming Events:
    College Advising
    Serving Higher Ed
    Chronicle Festival 2025
Sign In
News

Cybersecurity, Rising

Working to meet a national shortage of computer-safety personnel, colleges find customers and complications

By Paul Basken February 26, 2017
Cybersecurity, Rising 2
Illustration by Martín Elfman for The Chronicle

Once head of the Transportation Security Administration and deputy director of the FBI, John S. Pistole doesn’t have to struggle to explain the value of teaching cybersecurity.

Now president of Anderson University, in Indiana, Mr. Pistole notes that the computer systems of American companies both big and small are routinely getting hacked, costing them hundreds of billions of dollars annually. Hacking has also meant breaches of financial and personal privacy for millions of Americans. It is widely suspected of having played a key role in deciding the most recent U.S. presidential election. And right in Anderson, Ind., county-government leaders recently paid thousands of dollars in ransom to a foreign hacker who had shut down their computer systems.

To continue reading for FREE, please sign in.

Sign In

Or subscribe now to read with unlimited access for as low as $10/month.

Don’t have an account? Sign up now.

A free account provides you access to a limited number of free articles each month, plus newsletters, job postings, salary data, and exclusive store discounts.

Sign Up

Cybersecurity, Rising 2
Illustration by Martín Elfman for The Chronicle

Once head of the Transportation Security Administration and deputy director of the FBI, John S. Pistole doesn’t have to struggle to explain the value of teaching cybersecurity.

Now president of Anderson University, in Indiana, Mr. Pistole notes that the computer systems of American companies both big and small are routinely getting hacked, costing them hundreds of billions of dollars annually. Hacking has also meant breaches of financial and personal privacy for millions of Americans. It is widely suspected of having played a key role in deciding the most recent U.S. presidential election. And right in Anderson, Ind., county-government leaders recently paid thousands of dollars in ransom to a foreign hacker who had shut down their computer systems.

“There’s a critical shortage” of the workers and skills necessary to confront such problems, Mr. Pistole says.

That realization is spreading among colleges. But they aren’t yet producing enough graduates or offering the broad training that many experts regard as essential to meet the growing threat. Cybersecurity job postings grew 114 percent from 2011 to 2015, with 86 percent of the jobs requiring at least a bachelor’s degree, according to Burning Glass Technologies, a job-market-analytics company. Colleges are meeting only about 24 percent of the entry-level demand for those with four-year degrees.

Institutions like Anderson are adding undergraduate and graduate programs, seeing opportunity in a field long dominated by technical schools. Just this academic year, the university has added majors in cybersecurity and computer engineering.

Cybersecurity graduates can anticipate “negative unemployment as far as the eye can see in this realm,” says Joseph F. Sawasky, a former chief information officer at Wayne State University who now leads a cybersecurity training effort in Michigan.

Encouraged by federal incentives, many colleges are teaching computer code. But hacking is a crime that involves creativity, an understanding of human behavior, and expertise in the full range of endeavors that involve computers. A bachelor’s degree seems crucial to such training, and colleges are only beginning to identify what courses it should include.

“This is a serious shortcoming,” says Jeremy Epstein, deputy director of the Computer and Network Systems Division at the National Science Foundation. “Many people are saying we need to turn out more cybersecurity people. But we don’t agree on what ‘cybersecurity people’ means.”

The confusion stems from the history of the discipline. One of the organizational structures for teaching cybersecurity at the college level is the National Centers of Academic Excellence in Cyber Defense, run jointly by the National Security Agency and the Department of Homeland Security.

ADVERTISEMENT

More than 200 American colleges have earned the Centers of Academic Excellence designation, which affirms to students and employers that their cybersecurity curriculum meets a set of detailed standards.

The program was founded by the NSA in 1998 with an eye toward producing graduates for the agency’s specific needs — focused mostly on coding ability.

Its certification is enough for a university like Anderson to build a pipeline to government agencies, and to attract faculty members and students, Mr. Pistole says. It’s about “building a brand, frankly, which is an important thing for schools to do.”

In recent years, the national program has started to adapt, shifting toward a more comprehensive idea of what cybersecurity training could mean, says Daniel R. Stein, who directs cybersecurity education and training at the Department of Homeland Security. The federal certification process now requires colleges to show that a wide range of students, not just those in computer science, receive some cybersecurity training, Mr. Stein says.

Among the institutions that are shifting to a more comprehensive notion of cybersecurity is Clemson University. Its Humans and Technology Lab conducts research aimed at making automated systems better reflect the ways people actually behave, with protections designed accordingly. Recent projects include studying how patients use electronic health records and exploring the risks to privacy posed by wearable devices.

ADVERTISEMENT

Nationwide, colleges have a long way to go to incorporate that kind of broad approach into their educational and research agendas, says Kelly Caine, an associate professor of human-centered computing at Clemson, who heads the lab.

But even for institutions still focused mainly on teaching code, extensive worker shortages mean that cybersecurity graduates will find jobs, especially if they come with a solid liberal-arts education. Companies are accustomed to taking entry-level workers with raw ability and teaching them additional skills specific to their jobs.

TAKEAWAY

Cybersecurity may be hot, but it’s still evolving as a field

  • Demand for cybersecurity graduates is strong and is running well beyond the ability of colleges to produce enough qualified graduates.
  • Companies want colleges to produce good technical coders, but they are also seeking graduates who have a big-picture, interdisciplinary sense of what it takes to ensure computer-based security.
  • Colleges could produce more-valuable graduates by providing a broader curriculum, and by arranging more internships, apprenticeships, and other real-world experiences.
  • Higher education has a long way to go to incorporate cybersecurity basics — identifying basic risks, for example — into virtually every academic field.

Lisa Cannon, director of the IT department in Madison County, Ind., takes that approach. After paying foreign attackers who held the county’s computer systems hostage — blocking access to official records for courts, tax collection, property deeds, and other services affecting 130,000 residents — she found a graduate of Ball State University to manage the county’s newly tightened computer systems.

ADVERTISEMENT

With his education, the technician was “a jack of all trades and a master of none,” she says. A week of “boot camp” run by Cisco made him proficient in the specific skills the county needed, Ms. Cannon says.

The hackers’ attack happened less than two months after she was named director of technology, on the Friday evening before a scheduled Monday meeting to sign a contract establishing an off-site backup system. With more training, her predecessor might have recognized the need for the backup system, along with stricter rules that would have limited the access afforded to outside vendors — one of which accidentally allowed the attack.

Colleges can’t fight cybercrime alone. Incorporating holistic strategies requires incentives such as regulations and legal codes that put more responsibility on product designers for preventing computer-security problems, says Carl E. Landwehr, a cybersecurity research scientist at George Washington University.

Researchers and product designers also need to look anew at computer languages, says Mr. Landwehr, who previously worked at the Naval Research Laboratory. Many products and systems rely on programming languages that are prone to mistakes and were not designed with security as a primary objective, he says.

ADVERTISEMENT

“Right now,” Mr. Landwehr says, “we’re not building with very good lumber.”

Paul Basken covers university research and its intersection with government policy. He can be found on Twitter @pbasken, or reached by email at paul.basken@chronicle.com.

A version of this article appeared in the March 3, 2017, issue.
Read other items in The 2017 Trends Report.
We welcome your thoughts and questions about this article. Please email the editors or submit a letter for publication.
Share
  • Twitter
  • LinkedIn
  • Facebook
  • Email
Paul Basken Bio
About the Author
Paul Basken
Paul Basken was a government policy and science reporter with The Chronicle of Higher Education, where he won an annual National Press Club award for exclusives.
ADVERTISEMENT
ADVERTISEMENT

Related Content

Innovations in Cybersecurity Benefit Graduates and the Nation

More News

Vector illustration of large open scissors  with several workers in seats dangling by white lines
Iced Out
The Death of Shared Governance
Illustration showing money being funnelled into the top of a microscope.
'A New Era'
Higher-Ed Associations Pitch an Alternative to Trump’s Cap on Research Funding
Illustration showing classical columns of various heights, each turning into a stack of coins
Endowment funds
The Nation’s Wealthiest Small Colleges Just Won a Big Tax Exemption
WASHINGTON, DISTICT OF COLUMBIA, UNITED STATES - 2025/04/14: A Pro-Palestinian demonstrator holding a sign with Release Mahmud Khalil written on it, stands in front of the ICE building while joining in a protest. Pro-Palestinian demonstrators rally in front of the ICE building, demanding freedom for Mahmoud Khalil and all those targeted for speaking out against genocide in Palestine. Protesters demand an end to U.S. complicity and solidarity with the resistance in Gaza. (Photo by Probal Rashid/LightRocket via Getty Images)
Campus Activism
An Anonymous Group’s List of Purported Critics of Israel Helped Steer a U.S. Crackdown on Student Activists

From The Review

Illustration of an ocean tide shaped like Donald Trump about to wash away sandcastles shaped like a college campus.
The Review | Essay
Why Universities Are So Powerless in Their Fight Against Trump
By Jason Owen-Smith
Photo-based illustration of a closeup of a pencil meshed with a circuit bosrd
The Review | Essay
How Are Students Really Using AI?
By Derek O'Connell
John T. Scopes as he stood before the judges stand and was sentenced, July 2025.
The Review | Essay
100 Years Ago, the Scopes Monkey Trial Discovered Academic Freedom
By John K. Wilson

Upcoming Events

07-31-Turbulent-Workday_assets v2_Plain.png
Keeping Your Institution Moving Forward in Turbulent Times
Ascendium_Housing_Plain.png
What It Really Takes to Serve Students’ Basic Needs: Housing
Lead With Insight
  • Explore Content
    • Latest News
    • Newsletters
    • Letters
    • Free Reports and Guides
    • Professional Development
    • Events
    • Chronicle Store
    • Chronicle Intelligence
    • Jobs in Higher Education
    • Post a Job
  • Know The Chronicle
    • About Us
    • Vision, Mission, Values
    • DEI at The Chronicle
    • Write for Us
    • Work at The Chronicle
    • Our Reporting Process
    • Advertise With Us
    • Brand Studio
    • Accessibility Statement
  • Account and Access
    • Manage Your Account
    • Manage Newsletters
    • Individual Subscriptions
    • Group and Institutional Access
    • Subscription & Account FAQ
  • Get Support
    • Contact Us
    • Reprints & Permissions
    • User Agreement
    • Terms and Conditions
    • Privacy Policy
    • California Privacy Policy
    • Do Not Sell My Personal Information
1255 23rd Street, N.W. Washington, D.C. 20037
© 2025 The Chronicle of Higher Education
The Chronicle of Higher Education is academe’s most trusted resource for independent journalism, career development, and forward-looking intelligence. Our readers lead, teach, learn, and innovate with insights from The Chronicle.
Follow Us
  • twitter
  • instagram
  • youtube
  • facebook
  • linkedin