Professionalizing the Nation's Cybersecurity Workforce?

Professionalizing the Nation's Cybersecurity Workforce?

Author: National Research Council

Publisher: National Academies Press

Published: 2013-10-01

Total Pages: 66

ISBN-13: 0309291070

DOWNLOAD EBOOK

Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education-as well as organizations that employ cybersecurity workers-could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization.


Professionalizing the Nation's Cybersecurity Workforce?

Professionalizing the Nation's Cybersecurity Workforce?

Author: Computer Science

Publisher:

Published: 2013

Total Pages:

ISBN-13:

DOWNLOAD EBOOK

Annotation. "Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making" considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. "Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making" characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education--as well as organizations that employ cybersecurity workers--could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization.


Protecting Our Future, Volume 2

Protecting Our Future, Volume 2

Author: Jane LeClair

Publisher: Hudson Whitman/ ECP

Published: 2015-07-07

Total Pages: 142

ISBN-13: 0989845176

DOWNLOAD EBOOK

Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation’s sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture, and transportation. Used separately or together, these two volumes are an excellent foundational resource, and will enable cybersecurity practitioners, students, and employers to gain ground-level insight from experienced professionals, and to develop top-of-mind awareness in the areas most directly impacting the future of our nation’s security.


Protecting Our Future

Protecting Our Future

Author: Jane LeClair

Publisher: Hudson Whitman/ ECP

Published: 2013-12-15

Total Pages: 178

ISBN-13: 1626526397

DOWNLOAD EBOOK

In the world of technology, cybersecurity is, without a doubt, one of the most dynamic topics of our times. Protecting Our Future brings together a range of experts from across the cybersecurity spectrum and shines a spotlight on operational challenges and needs across the workforce: in military, health care, international relations, telecommunications, finance, education, utilities, government, small businesses, and nonprofits. Contributors offer an assessment of strengths and weaknesses within each subfield, and, with deep subject-matter expertise, they introduce practitioners, as well as those considering a future in cybersecurity, to the challenges and opportunities when building a cybersecurity workforce.


A Report to the President on Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce

A Report to the President on Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce

Author:

Publisher:

Published: 2018

Total Pages: 49

ISBN-13:

DOWNLOAD EBOOK

This report responds to the May 11, 2017, Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. That order directs the Secretary of Commerce and the Secretary of Homeland Security to: 1) Assess the scope and sufficiency of efforts to educate and train the American cybersecurity workforce of the future, including cybersecurity-related education curricula, training, and apprenticeship programs, from primary through higher education; and 2) Provide a report to the President with findings and recommendations regarding how to support the growth and sustainment of the Nation's cybersecurity workforce in both the public and private sectors.


Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning

Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning

Author: Department of Homeland Security

Publisher:

Published: 2018-06-03

Total Pages: 97

ISBN-13: 9781983066306

DOWNLOAD EBOOK

Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic of importance is how organizations track, assess, grow, and shape their workforce. Many organizations have turned to workforce planning as a way to understand their current cybersecurity human capital skills and abilities as well as potential infrastructure needs. The National Initiative for Cybersecurity Education (NICE) evolved from the Comprehensive National Cybersecurity Initiative (CNCI), Initiative 8 - Expand Cyber Education, to develop a technologically-skilled and cyber-savvy workforce with the right knowledge and skills. Towards these ends, Component 3 of NICE is focused on the cybersecurity Workforce Structure - specifically talent management and the role of workforce planning in developing the national cybersecurity workforce. NICE has initiated discussions and issued guidance on workforce planning for cybersecurity best practices. In spring 2012, NICE published a white paper titled: Best Practices for Planning a Cybersecurity Workforce1, which introduces workforce planning methodologies for cybersecurity. This White Paper introduces a qualitative management tool, a Cybersecurity Workforce Planning Capability Maturity Model, to help organizations apply the best practice elements of workforce planning in analyzing their cybersecurity workforce requirements and needs. Contents * EXECUTIVE SUMMARY * THE CYBERSECURITY LANDSCAPE: NOW'S THE TIME TO PLAN * MAKING THE CASE: A NEED FOR CYBER WORKFORCE PLANNING CAPABILITY * The Practice of Workforce Planning * The Benefits of Workforce Planning * INTRODUCTION TO THE NICE CMM DEFINING WORKFORCE CMMS * Existing Models * Components of the NICE CMM * Criteria Areas * Maturity Levels * DETAILED OVERVIEW OF THE NICE CMM Process and Analytics * Integrated Governance * Skilled Practitioners and Enabling Technology * ACHIEVING MATURITY * Differing Maturity Goals * Assessing Current Capability * Step One: Gather Data * Step Two: Analyze Data and Determine Current Maturity * Step Three: Progressing in Maturity * BENEFITS OF ACHIEVING CYBERSECURITY WORKFORCE PLANNING MATURITY * CONCLUSION Book 2: Best Practices for Planning a Cybersecurity Workforce White Paper - The Nation's cybersecurity workforce is at the forefront of protecting critical infrastructure and computer networks from attack by foreign nations, criminal groups, hackers, and terrorist organizations. Organizations must have a clear understanding of their cybersecurity human capital skills and abilities as well as potential infrastructure needs to ensure protection against threats to information systems. Today, the cybersecurity community has evolved enough to define a National Cybersecurity Workforce Framework for understanding specialty areas of cybersecurity work and workforce needs. As a result, the field has reached a maturity level that enables organizations to inventory current capabilities. Next, as the nation seeks to build a skilled cybersecurity workforce, it will be necessary for organizations to mature further and begin forecasting future demand for the cybersecurity workforce. B2-A * INTRODUCTION * B2-B * BACKGROUND * B2-C * APPROACH * B2-D * CYBERSECURITY REQUIREMENTS * B2-E * CONCLUSION


Global Cyber Security Labor Shortage and International Business Risk

Global Cyber Security Labor Shortage and International Business Risk

Author: Christiansen, Bryan

Publisher: IGI Global

Published: 2018-10-05

Total Pages: 467

ISBN-13: 1522559280

DOWNLOAD EBOOK

Global events involving cybersecurity breaches have highlighted the ever-growing dependence on interconnected online systems in international business. The increasing societal dependence on information technology has pushed cybersecurity to the forefront as one of the most urgent challenges facing the global community today. Poor cybersecurity is the primary reason hackers are able to penetrate safeguards in business computers and other networks, and the growing global skills gap in cybersecurity simply exacerbates the problem. Global Cyber Security Labor Shortage and International Business Risk provides emerging research exploring the theoretical and practical aspects of protecting computer systems against online threats as well as transformative business models to ensure sustainability and longevity. Featuring coverage on a broad range of topics such as cybercrime, technology security training, and labor market understanding, this book is ideally designed for professionals, managers, IT consultants, programmers, academicians, and students seeking current research on cyber security’s influence on business, education, and social networks.


A Human Capital Crisis in Cybersecurity

A Human Capital Crisis in Cybersecurity

Author: Karen Evans

Publisher: CSIS

Published: 2010-11-15

Total Pages: 46

ISBN-13: 0892066091

DOWNLOAD EBOOK

Evidence continues to build showing our information infrastructure is vulnerable to threats not just from nation states but also from individuals and small groups who seek to do us harm or who wish to exploit our weaknesses for personal gain. A critical element of a robust cybersecurity strategy is having the right people at every level to identify, build and staff the defenses and responses. And that is, by many accounts, the area where we are the weakest.


The Cybersecurity Workforce of Tomorrow

The Cybersecurity Workforce of Tomorrow

Author: Michael Nizich

Publisher: Emerald Group Publishing

Published: 2023-07-31

Total Pages: 106

ISBN-13: 1803829176

DOWNLOAD EBOOK

The Cybersecurity Workforce of Tomorrow discusses the current requirements of the cybersecurity worker and analyses the ways in which these roles may change in the future as attacks from hackers, criminals and enemy states become increasingly sophisticated.


A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Author: Dan Shoemaker

Publisher: CRC Press

Published: 2018-09-03

Total Pages: 503

ISBN-13: 1315359960

DOWNLOAD EBOOK

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.