Codify — Article

Cyber PIVOTT Act creates CISA-led scholarship and internship pipeline at two-year schools

Establishes a CISA program funding full scholarships, skills exercises, and internships at community colleges and technical schools tied to a two-year government service obligation.

The Brief

The Cyber PIVOTT Act adds a new CISA program that partners with community colleges, technical schools, and other two‑year institutions to deliver skills-based cybersecurity training, pay full student costs, place students in internships, and steer graduates into public-sector cyber roles. The bill funds comprehensive scholarships (tuition, fees, stipends, travel, certification fees) and requires participants to satisfy a two‑year post‑completion service obligation in a cyber or cyber‑relevant role for federal or nonfederal governments, with limited exceptions and deferment options.

Why it matters: this is a supply‑side approach to federal cyber hiring that shifts resources to shorter, skills‑focused pathways and regional schools rather than relying solely on four‑year pipelines. For compliance officers, workforce planners, and community colleges, the bill creates new program design requirements, internship coordination tasks, and repayment mechanics that could reshape hiring, training, and budget priorities across federal and state cyber operations.

At a Glance

What It Does

The bill requires the CISA Director to form partnerships with eligible two‑year institutions, provide full scholarships covering a broad set of student costs, require completion of at least four skills‑based exercises (one in‑person), and coordinate approved internships. Graduates must serve two years in a cyber role for government employers or face repayment rules.

Who It Affects

Community colleges, technical schools, and NCAE‑C participants that opt into the program; students in two‑year cyber or cyber‑relevant programs; CISA and other federal agencies handling internships and clearances; state, local, tribal, and territorial employers seeking cyber talent.

Why It Matters

It creates a federal funding and placement pathway targeted to shorter cybersecurity credentials, sets measurable enrollment growth targets (starting at 250 students and scaling toward 1,000 with a 10,000‑student planning goal), and ties scholarships to service and loan/repayment rules modeled on federal student loans.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill establishes the PIVOTT Program inside CISA to bring federal funding and placement coordination to two‑year cybersecurity pathways. CISA must recruit eligible community colleges, technical schools, and comparable institutions (with a preference for NCAE‑C participants or schools the Director approves) and offer a package of supports to students who are pre‑enrollment, in their first semester, mid‑career entrants, or enrolled in short technical certifications mapped to NICE/TKS.

The program name, participant categories, and the broad intent to partner with regional institutions are explicit in the statute.

Scholarships are comprehensive: they cover tuition and academic fees, labs, travel, lodging, per diem, stipends, virtual participation costs, certification exam fees, and expenses for required in‑person exercises. To receive these benefits students must complete the program within four years (subject to institutional rules) and accept a two‑year post‑completion service obligation in a cyber or cyber‑relevant role for an executive agency or a state/local/tribal/territorial government.

The statute creates carve‑outs for prior or ongoing military service and allows students who immediately pursue a four‑year degree to delay fulfilling the service obligation until after that degree.CISA must also prescribe program content: each student must complete at least four eligible skills‑based exercises (laboratory work, capture‑the‑flag events, virtual programming, table‑tops, industry workshops, etc.), with at least one done in person. CISA coordinates semesterly offerings, can partner with other federal agencies and nonfederal cyber entities, and must arrange approved internships as a core requirement — prioritizing federally oriented internships with clearances for students who indicate intent to serve in government.

The Director is tasked with initiating clearance processes no later than one year before a student completes the program.On completion, CISA maintains a mapped online database of training resources and job opportunities, publishes an annually updated list of acceptable certification programs, and may fund up to three certification vouchers per graduate within ten years of completion. The statute authorizes a discretionary small scholarship program for selected long‑service federal employees who began in PIVOTT and later seek NCAE‑C degrees.

Repayment provisions are specific: if program conditions are violated (academic standing, dismissal, withdrawal, or refusal to fulfill the service obligation), the scholarship recipient becomes liable to repay; early defaults within the first year of post‑award employment convert the award into a Federal Direct Unsubsidized Stafford Loan with interest from the award date and repayment terms set in regulation. Participating institutions must contractually help monitor post‑award compliance, and CISA may waive or suspend repayments for impossibility or extreme hardship.The bill sets implementation and scale expectations: CISA and partners should seek to enroll at least 250 students in the first full academic year (one year after enactment), double annual enrollment each subsequent year until reaching 1,000, and prepare a plan within 90 days to reach an annual capacity of 10,000 students within ten years.

CISA must also deliver a 90‑day review of its existing education and training programs and report on the Department’s support for the CyberCorps Scholarship for Service program.

The Five Things You Need to Know

1

CISA must provide full scholarships that cover tuition, lab fees, travel, lodging, per diem, stipends, certification exam fees, and costs for required in‑person exercises.

2

Program participants must complete at least four skills‑based exercises and at least one must be in‑person; CISA must coordinate a semesterly exercise and an in‑person offering at least every two years.

3

Graduates incur a two‑year service obligation in a cyber or cyber‑relevant role for federal or state/local/tribal/territorial governments, with military service exceptions and a deferment option for students who pursue a four‑year degree immediately after completion.

4

If a scholarship recipient fails program rules or the service obligation, the award may be repaid immediately or converted into a Federal Direct Unsubsidized Stafford Loan, with interest accruing from the award date and repayment terms set by regulation.

5

The statute sets enrollment goals (250 in year one, ramping to 1,000 annually, and a requirement that CISA develop a plan to reach 10,000 per year within ten years) and requires a 90‑day CISA review of existing training resources.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1334(a)(1)

Program establishment and student eligibility

This subsection directs the CISA Director to form partnerships with community colleges, technical schools, and other two‑year institutions to run the PIVOTT Program and specifies four categories of eligible students (pre‑enrollment, first semester, career changers/entry level, and short certifications aligned to NICE/TKS). Practically, institutions will need procedures for identifying eligible students and coordinating with CISA during recruitment and enrollment; CISA gains discretion to approve non‑NCAE‑C schools based on curriculum alignment and campus capabilities such as cybersecurity clinics.

Section 1334(a)(1)(C–E)

Scholarship package, completion timeline, and service obligation

This portion lists what the scholarship covers in considerable detail and sets a four‑year completion window with a Director‑managed hardship waiver process for extensions. It binds scholarship recipients to a two‑year public‑sector cyber service obligation, but creates military service and commissioning exceptions and allows delay of the obligation for students who immediately enter four‑year degree programs. Administratively, CISA must track completion dates, maintain waiver records, and coordinate deferrals linked to later degrees.

Section 1334(a)(2–3)

Institutional eligibility and skills‑based curriculum

Institutions qualify by NCAE‑C participation or CISA determination; CISA evaluates virtual and in‑person alignment to NICE pathways and campus cybersecurity resources. The Program centers on hands‑on, condensed 'skills‑based exercises' (lab work, hackathons, table‑tops, etc.). CISA must coordinate to offer at least one such exercise per semester and guarantee at least one in‑person exercise every two years — a requirement that will shape scheduling, facilities planning, and partnerships with federal and nonfederal exercise providers.

3 more sections
Section 1334(a)(3)(D)–(4)

Internship placements and outreach

CISA and participating institutions must place students in approved internships with state/local/tribal/territorial governments, rural or high‑risk critical infrastructure owners/operators, or federal agencies (including regional advisors). The statute prioritizes clearance‑required federal internships for students who express intent to join government service. CISA must run regional outreach, solicit industry input via an advisory forum, and host an annual voluntary federal recruitment fair tied to a job board — operational tasks that implicate interagency coordination and employer engagement strategies.

Section 1334(a)(5)–(6) and (d–f)

Completion benefits, certification vouchers, and repayment mechanics

On program completion CISA must maintain a mapped online database of resources and may voucher up to three certification exams per student (within ten years). It can award discretionary scholarships for long‑service alumni seeking NCAE‑C degrees. If students breach academic or post‑award employment obligations the scholarship becomes repayable; early breaches convert the award into a Federal Direct Unsubsidized Stafford Loan with interest from award date. Participating institutions must agree to monitor compliance; CISA can waive or suspend repayment for impossibility or extreme hardship and institutions may retain a fixed percentage of collected repayments to cover admin costs.

Section 1334(g)–(h) and Sections (c–d) of the Act

Implementation targets, reporting, and program review

The law sets explicit enrollment growth targets (250 first year, doubling annually to 1,000, plus a requirement to plan for 10,000 within ten years) and requires CISA to brief Congressional homeland security committees if targets are missed. Separately, CISA must deliver a 90‑day review of its current education and training programs and DHS must report on CyberCorps Scholarship for Service support opportunities. These provisions impose clear milestones and Congressional briefing obligations that will drive early program priorities and resource requests.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Technology across all five countries.

Explore Technology in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Community college and technical school students — receive full support (tuition, fees, travel, stipends, certification fees) and prioritized internship and federal recruitment pipelines that lower economic barriers to entering cyber careers.
  • Participating two‑year institutions — gain federal funding support, stronger employer and agency connections, and potential retention/placement outcomes that can boost enrollment and program reputation.
  • State, local, tribal, and territorial governments — gain a federally coordinated pipeline of mid‑level cyber talent and prioritized internship placements that can improve regional cyber resiliency.
  • Federal agencies (including CISA) — obtain a scalable talent source tailored to NICE role definitions and an internship channel that can feed clearance‑eligible hires.
  • Rural and critical infrastructure operators — receive internship candidates and training partnerships prioritized in the statute, improving local cyber capacity where private sector demand is weak.

Who Bears the Cost

  • Department of Homeland Security/CISA budget — must fund scholarships, exercises, internships, clearance processing support, program staffing, outreach, and the database; reaching statutory enrollment goals requires sustained appropriations.
  • Participating institutions — shoulder administrative burdens for student monitoring, internship placements, in‑person exercise logistics, and compliance agreements; they may need facility upgrades and staff time to meet CISA standards.
  • Federal agencies processing security clearances — face increased workload to initiate clearances for students, particularly if many students are prioritized for clearance‑required internships within a narrow window.
  • Taxpayers — shoulder the fiscal risk of full scholarships, voucher programs, and possible loan conversion or waiver accommodations; scaling to thousands of students amplifies that exposure.
  • Program administrators and collections systems — responsible for enforcing service obligations and managing conversion of scholarships to loans, including tracking employment outcomes across jurisdictions which carries administrative cost.

Key Issues

The Core Tension

The central dilemma is how to expand a rapid, skills‑focused cyber workforce pipeline through generous federal subsidies and placement guarantees while preserving credential quality, avoiding overwhelmed clearance and placement systems, and maintaining fiscal accountability — a trade‑off between speed/scale and program integrity/administrability.

The bill balances strong incentives (comprehensive scholarships, certification vouchers, internship prioritization) with an enforced service obligation, but leaves several operational questions unanswered. First, the timing and resource demands of initiating security clearances 'not later than one year before' program completion could bottleneck placement: agencies process clearances at widely varying speeds, and a surge of students could overwhelm capacity or delay internships.

Second, the statute ties scholarship repayment enforcement to participating institutions for monitoring compliance but also allows institutions to retain a fixed percentage of collected repayments to cover administrative costs; the fixed percentage is to be set by the Secretary but is unspecified here, creating potential misalignment between collection burden and compensation.

Scaling is another tension. The enrollment ramp from 250 to 1,000 and a 10,000‑student planning goal places heavy reliance on institutional capacity, instructor availability, lab space for in‑person exercises, and consistent appropriations.

Rapid scale could dilute quality unless CISA invests in rigorous alignment to NICE pathways and ensures participating institutions meet minimum instructional standards. Finally, the conversion of failed scholarships into Federal Direct Unsubsidized Stafford Loans introduces a consumer‑debt pathway that borrows from the student‑loan regime but layers program‑specific triggers; regulators will need to craft repayment terms and administrative processes (including for deferments, hardship waivers, and collections) that are consistent with both education‑loan law and the program's workforce aims.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.