Author: Lesly Galiana
![](https://fins.institute.ufl.edu/wp-content/uploads/2025/02/new-write-up-pic-300x162.png)
FINS Celebrates Important Workforce Development Milestone with Graduation of 1st FTP Cohort
/The Florida Institute for National Security (FINS) proudly marked a significant milestone this January with the successful completion of the inaugural cohort of the FINS Talent Pipeline (FTP) Program. The conclusion ceremony, held on campus on the 17th, celebrated not only the achievements of the students but also FINS’ commitment to meeting its mission of producing a talent pipeline of AI and data science-knowledgeable professionals in support of national security.
Read more »![](https://fins.institute.ufl.edu/wp-content/uploads/2024/10/KY-CTP-300x150.jpg)
FINS Talent Pipeline Program Featured in UF News
/FINS’ Talent Pipeline (FTP) Program continues to garner attention across campus and beyond.
Read more »![](https://fins.institute.ufl.edu/wp-content/uploads/2024/05/AdobeStock_757635743-300x168.jpg)
FINS EPA with NSA
/The University of Florida (UF) has entered into an Education Partnership Agreement (EPA) with the National Security Agency (NSA). The partnership will seek to enhance Science, Technology, Engineering & Math (STEM) education at UF by enabling technical exchanges, as well as the sharing of educational materials and equipment between the two entities. Moreover, as a result of this agreement, any UF student or faculty would have access to a wide pool of resources and expertise – all while gaining invaluable work experience.
Read more »![](https://fins.institute.ufl.edu/wp-content/uploads/2024/05/IARPA-Final--300x168.jpg)
FINS Faculty Play Pivotal Role in New Cybersecurity-Focused IARPA Project
/FINS faculty, Dr. Bonnie J. Dorr and Sonja M. Schmer-Galunder, are among the recipients of a new, large, multi-institutional award from the Intelligence Advanced Research Projects Activity (IARPA) agency – the research arm of the Office of the Director of National Intelligence- that delves into the psychology of cyber attackers.
Read more »