News

September 9, 2021

The Search for the Cyber Unicorn

Are Cyber Unicorns Real? The Truth About Entry-Level Cybersecurity Hiring

Every industry event echoes the same frustration—employers can’t find the right cybersecurity talent, and eager candidates can’t even get an interview. Is the mythical “cyber unicorn”—the perfect entry-level hire with advanced skills and experience—just that, a myth? The Search for the Cyber Unicorn dives deep into this paradox, uncovering the real disconnect between job expectations and candidate qualifications. Through candid interviews with HR professionals across Florida, this report reveals what’s really happening in cybersecurity hiring: how collaboration, internal hiring, and experience weigh into the equation. If you’re tired of the talent gap narrative and ready for real solutions, this report is your guide to bridging the divide.

The Search for the Cyber Unicorn2025-03-28T17:26:27-04:00

Cybersecurity Fundamentals for Florida Manufacturers: FloridaMakes Webinar

This webinar will cover how to plan a simple roadmap and additional recommendations for getting started defending your company from Cybersecurity attacks.

For FloridaMakes clients working with Defense customers, provided is an overview of the Department of Defense Cybersecurity Maturity Model Certification (CMMC) program, and recommendations for getting started and achieving this critical compliance requirement.

Speakers will present the no-cost programs and services available to Florida companies, including the Critical Infrastructure Risk Assessment.

The presentation will conclude with next steps and additional resources to get you on a path toward CMMC compliance.

Finally, extra time will be allocated for a robust Q&A starting with a review of the concerns posed at the prior webinar.

Key Takeaways:        

  • Briefly review the key concepts of cybersecurity, CMMC Level 1 and Level 2, DIB, FCRA and other pertinent acronyms;
  • Resume learning the roadmap for starting a Cybersecurity practice if you don’t already have one;
  • Overview and key steps for achieving CMMC compliance for Defense suppliers;
  • No-cost resources provided by Cyber Florida, including the Critical Infrastructure Risk Assessment.
Cybersecurity Fundamentals for Florida Manufacturers: FloridaMakes Webinar2025-04-14T11:18:32-04:00

Teacher Spotlight: Jim Brockman

Jim Brockman

Teacher: Jim Brockman

School: Plant High School

County: Hillsborough

Meet Jim Brockman, a fantastic teacher at Plant High School in Hillsborough County. Originally from Cincinnati, Ohio, Jim has been a passionate educator since the start of his career. After teaching in Ohio and Kentucky, he moved to Tampa, Florida, in 2005 to join Jefferson High School, where his dedication to teaching and student success quickly stood out.

In 2010, he joined Strawberry Crest High School to lead the IB Physics program, playing a key role in shaping the school’s academic environment. Now in his fourth year at Plant High, Jim has expanded his expertise to include computer science and cybersecurity, pioneering the integration of advanced technology into the curriculum.

His contributions to curriculum development in Hillsborough County Public Schools are significant—he has written state course descriptions and exam content. Beyond academics, Jim has coached various extracurricular teams and founded Tampa’s first high school rowing club.

Embracing the opportunity to teach cybersecurity, Jim sees it as a modern solution to the decline of vocational programs, offering students both immediate job prospects and pathways to further education.

Outside the classroom, Jim is also an accomplished musician and a founding member of the band Dads of Lore, showcasing his diverse talents and dedication to enriching lives.

Jim Brockman’s career exemplifies his commitment to education and innovative teaching. He has made a lasting impact on students and the broader educational community.

Would you like to be featured in our Teacher Spotlight? To nominate yourself or another deserving teacher, complete the interest form below!

Teacher Spotlight: Jim Brockman2025-03-25T13:43:13-04:00

OpK12 Virtual Session – April 17, 2025 @ 5pm EST

Join us on April 17, 2025 at 5:00 pm EST

Virtual CyberLaunch debrief: Exploring trends and takeaways from the 2025 Capture the Flag competition

Did you bring students to CyberLaunch and/or want to learn more? Join Cyber Florida and EC Council as we review the results and takeaways from CyberLaunch, the nation’s largest state-wide cybersecurity competition. Together, we will review general results/trends, examine individual scores, answer questions about the competition, and explore future teaching/learning opportunities for your classroom.
OpK12 Virtual Session – April 17, 2025 @ 5pm EST2025-03-14T10:26:40-04:00

OpK12 Virtual Session – March 27, 2025 @ 5pm EST

Join us on March 27, 2025 at 5:00 pm EST for a virtual session just for cyber teachers.

Are you teaching high school cybersecurity in Florida next year? Join Cyber Florida and UTeach to explore instructional resources and an exciting scholarship available for summer professional development. Potential teacher scholarship includes: $500 stipend, professional development ($1,000 value), curriculum licenses ($950 value), on-demand support, and Codio platform accounts!
OpK12 Virtual Session – March 27, 2025 @ 5pm EST2025-03-14T10:07:14-04:00

No Password Required Podcast Episode 57 — Rob Allen

No Password Required Podcast Episode 57 — Rob Allen

No Password Required Podcast Episode 57 — Rob Allen2025-03-13T14:15:29-04:00

FEMA Offering “Recovering From Cybersecurity Incidents” Course in March

This 16-hour course provides guidance on building and executing a robust cybersecurity incident recovery program, covering both pre- and post-incident stages. It bridges IT and emergency management to help government, critical infrastructure, and private-sector personnel effectively respond to and recover from cyber disruptions.

Through interactive discussion and practical exercises, participants will learn best practices and tactical strategies for restoring operations following a cyber-attack. By the end of this course, you’ll be equipped to strengthen organizational resilience, manage cyber incidents more effectively, and build an action plan for continued readiness.

As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

Key Topics Include:

  • Understanding essential cyber terminology and the cyber incident life cycle
  • Recognizing threat levels and exploring emergency management practices
  • Examining the recovery continuum and government’s role in cybersecurity
  • Integrating cyber into the Incident Command System (ICS)
  • Leveraging federal resources and key programmatic elements that drive successful recovery
  • Learning how to plan, organize, equip, train, and exercise for cyber incidents
  • Implementing short-term and long-term recovery actions
  • Building a cyber incident recovery action plan tailored to your organization’s needs

Suggested Audience

  • Government and private sector IT staff
  • Local administrators and upper-level management personnel
  • System administration
  • Risk management personnel
  • Local government administration
  • Emergency management coordinators

Upon successful completion, you will be able to:

  • Describe fundamental concepts and resources related to cyber incident recovery.
  • Examine recovery preparedness for cybersecurity incidents.
  • Examine tactical, short-term and strategic, long-term recovery operations for cybersecurity incidents.
  • Produce a cyber incident recovery action plan based on the scenario information provided.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasidopens in a new tab; or with TEEX assistance upon arrival for class.

FEMA Offering “Recovering From Cybersecurity Incidents” Course in March2025-04-14T11:18:58-04:00

Pinellas County Tabletop Exercise

Registration is closed for this event. If you would like to participate in a future event, please reach out to us – https://cyberflorida.org/connect

April 10, 2025 cybersecurity tabletop exercise tailored for Pinellas County

Participants will engage in an exciting tabletop exercise hosted by the NUARI, offering hands-on experience in responding to cyber incidents. A free lunch will be provided, along with opportunities to network with cybersecurity experts and industry peers.

Don’t miss this chance to improve your cybersecurity posture and resilience!

Pinellas County Tabletop Exercise2025-04-02T09:13:47-04:00

Unlocking Potential: The Critical Role of Basic Research in Cybersecurity

This webinar will underscore the crucial role of basic research in driving cybersecurity innovation from a multidisciplinary perspective and raise awareness within the academic community about UC2’s interest in partnering to fund groundbreaking basic research in cybersecurity.

With a welcome introduction by National Defense University’s President, VADM Peter A. Garvin, USN, guest speakers from Space Force, Air Force and Minerva Research Initiative will address cyber strategy for Space Force, levels of basic research and technological applications, research requirements, future-focused discussions, and human-centered needs.

Speakers:

  • Lt Col Marouane Balmakhtar, Space Force
  • Dr. Lisa Bellamy, Senior Program Development Manager, AFCYBER/TD
  • Dr. Gregory Ruark, Program Manager, Dynamical Influences on Social Systems, Humans in Complex Systems Competency, Army Program Manager, Minerva Research Initiative DEVCOM ARL Army Research Office

Register today to join this conversation about the transformative potential of basic research in cybersecurity and discover exciting opportunities for academic partnerships with UC2.

Communication, Collaboration and Access: UC2 aims to fill this gap through its mission of increasing communication, collaboration, and access. UC2 funds basic and applied research. With a strong focus on partnerships, UC2 measures the impact of collaboration. UC2 believes that partnership will influence how research is transferred into the hands of users and also the DoD challenges are transferred back to the academic teams who can address them.

Unlocking Potential: The Critical Role of Basic Research in Cybersecurity2025-04-14T11:19:20-04:00