Cybersecurity Industry Brief
|
|
- Carmel Lewis
- 8 years ago
- Views:
Transcription
1 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief
2 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery County Investment Board e mission of the Montgomery Workforce Investment Board (WIB) is to help businesses succeed through workforce services. e WIB is a public-private partnership that assists the County in connecting business with job seekers. e WIB oversees MontgomeryWorks and provides liaison to the County Executive and Council. e 30-member board is appointed by the County Executive in accordance with the Workforce Investment Act (WIA) of 1998 and Montgomery County Executive Order No e members are specified in law and by an executive order are largely business owners, community based organizations, educational institutions, labor unions, and others. MontgomeryWorks served over 12,000 adult and youth residents in FY12. Montgomery- Works provides core services, intensive counseling services and occupational skills training to both businesses and individuals. Business services include: Assistance in recruitment including specialized recruitments, job fairs and access to local candidates through unlimited job postings using the Maryland Workforce Exchange Interview and recruitment event space Local labor market information and research Active jobb openings in a searchable statewide database Assistance in identifying trainers and expert speakers e WIB s Strategic Plan calls for aligning all service delivery to industry needs. e Workforce Investment Board has selected three industry sectors, of which Cybersecurity is one, in support of the Strategic Plan. e industries were selected based on the following criteria: Industries that were either high growth and high demand or high wage. Examined initial industry sectors for alignment with Economic Development targets. Examined policy implications for vendor selection process; for diversity of occupations. Details are available at the MontgomeryWorks website
3 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 2 Cybersecurity Industry Brief Key Findings Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. It is a branch of computer technology known as information security as applied to computers and networks. Cybersecurity is a county and state priority. ere are close to 38,000 cybersecurty jobs in Montgomery County. Cybersecurity sub-sector makes up 5.87% of total employment in Montgomery County. For comparison, in Maryland the percentage of cybersecurity jobs in the state economy is 3.9%; in Howard County, 6.8%; and in Frederick County, 3.7%. ere are over 70 employers, some of which are the largest employers in the county, with operations related to cybersecurity. Cybersecurity sub-sector has outperformed the overall economy in terms of historic job growth over the past five years. Seven out of eleven occupations in the subsector have grown at 1%-12% rate. Location Quotients, which describe the concentration of jobs in a particular industry or occupation relative to the national average, for all occupations in the sub-sector are above the national average. Projected employment growth over the next ten years is positive for all, but two occupations. In 2012 there were approximately 1200 openings in the sub-sector from entry level jobs that require an associate s to high level jobs requiring bachelors s and above. e median hourly earnings for employees in the Cybersecurity sub-sector is $41, while the overall median hourly earnings are $26. What is Cyber Security Industry? Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. It is a branch of computer technology known as information security as applied to computers and networks. Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include: Application security - encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system vulnerabilities through flaws in the design, development, deployment, upgrade, or maintenance of the application. Information security - (sometimes shortened to InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc.) Network security - provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Disaster recovery / business continuity planning - Disaster recovery (DR) is the process, policies and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster.[1] Disaster recovery is a subset of business continuity.[2] While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions End-user education - e integrity of company's critical resources and confidential data can be significantly affected by end-users. Educating them about the signs of malware and phishing attacks can increase overall security and make employees a vital part of a successful defense strategy. County Priority e National Institute of Standards and Technology (NIST) located in Gaithersburg announced a new partnership to establish the National Cybersecurity Center of Excellence, a public-private collaboration for accelerating the widespread Page 2
4 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 3 adoption of integrated cybersecurity tools and technologies. e State of Maryland and Montgomery County, Md., are co-sponsoring the center with NIST, which will work to strengthen U.S. economic growth by supporting automated and trustworthy e-government and e-commerce. NIST s fiscal year 2012 appropriations provided $10 million to establish the public-private partnership to operate the center. It will provide a state-of-the-art computing facility near NIST s Gaithersburg, Md., campus, where researchers from NIST will work collaboratively with both the users and vendors of cybersecurity products and services. e center will host multi-institutional, collaborative efforts that build on expertise from industry and government. Federal and State Activity Maryland has a critical mass of federal agencies and information technology companies that place it as a national epicenter of federal cybersecurity activities. Federal cybersecurity facilities include NSA, Defense Information Systems Agency (DISA), Intelligence Advanced Research Projects Activity, the National Institute of Standards and Technology, and 12 major military installations (including Fort Meade in Anne Arundel County which is home to the U.S. Cyber Command). e State of Maryland has been very active in cybersecurity including a cybersecurity summit in Current Employment in Major Industry Sectors Cybersecurity is part of the Professional, Scientific, and Technical Services sector. Overall number of jobs in the Professional, Scientific, and Technical Services sector is over 98,000. Cybersecurity related jobs constitute estimated 40% of the sector. Distribution of Employment by Industry Sector e Pathways to Cybersecurity Careers Consortium received a $4.9 million grant over three years from the U.S. Department of Labor to increase the pipeline of skilled cybersecurity professionals with appropriate industry certifications. Consortium members include workforce agencies, community colleges, businesses, industry experts, government agencies, educational institutions, and community organizations. Figure 1. Source: EMSI Complete Employment. Page 3
5 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 4 Employment in Cybersecurity Sub-Sector Cyber security specialists may be described as workers who protect the data and systems in networks that are connected to the Internet. Main occupational categories for cyber security specialists are: Computer Programmers Computer Support Specialists Computer and Information Scientists Computer Software Engineers Computer Systems Analysts Database Administrators Network and Computer Systems Administrators Network Systems and Data Analysts. Overview Jobs (2013) % Change ( ) Median Earnings 38, % $41.06/hr County Location Quotient: 2.23 Nation: 3.8% Nation: $35.89/hr Maryland Location Quotient: 1.51 Maryland: 7.9% Maryland: $38.83/hr Occupation Details SOC Description 2007 Jobs 2012 Jobs Change % Change Location Quotient 2013 Annual Openings Median Hourly Earnings Avg. Hourly Earnings Computer and Information Systems Managers 2,615 2, % $62.95 $ Management Analysts 11,310 12, % $37.41 $38.62 Computer and Information Research Scientists % $55.16 $52.19 Education Level or higher, plus work experience or higher, plus work experience Doctoral Computer Programmers 2,542 2,316 (226) (9%) $37.39 $ Software Developers, Applications 4,057 4, % $45.18 $ Software Developers, Systems Software 3,648 3, % $44.88 $ Database Administrators % $44.31 $ Network and Computer Systems Administrators 2,553 2,500 (53) (2%) $40.44 $ Computer Support Specialists 4,368 4,349 (19) 0% $28.14 $30.22 Associate's Information Security Analysts, Web Developers, and Computer Network Architects 3,392 3, % $40.40 $40.90 Computer Hardware Engineers 1, (20) (2%) $49.22 $49.68 Total 37,087 38, % 1,171 $41.06 $42.22 Source: EMSI EMSI's proprietary employment data, combined with occupation-specific percentages from the U.S. Bureau of Labor Statistics Employment Projections program. Page 4
6 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 5 Distribution of Employment by Occupation Montgomery County, Source: EMSI EMSI's proprietary employment data, combined with occupation-specific percentages from the U.S. Bureau of Labor Statistics Employment Projections program. Here Annual Openings is an estimated employment change and turnover for an occupation for a given year. is is EMSI's estimate of labor market demand for an occupation, and when combined with Related Completions (see Table 6) gives a picture of the supply and demand of the occupation in the region. e majority of openings (948) require Bachelor s or higher, plus work experience, 55 openings require Doctoral and 23 openings require Associate s. Page 5
7 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 6 Company Name Employers Employment 2012 NAICS NAICS Lockheed Martin-Information Systems & Global Services (IS&GS) International Business Machines (IBM) Research and Developmetn in the Physical, Engineering, and Life Sceinces (except Biotechnology) Computer and Computer Peripheral Equipment and Software Merchant Wholesalers Booz Allen Hamilton, Inc Administrative Management and General Management Consulting Services Terrapin Systems, Inc Administrative Management and General Management Consulting Services Research and Development in the Physical, Engineering, BAE Systems Support Solutions 400 and Life Sciences (except Biotechnology) URS Corporation Engineering Services Energy Enterprise Solutions LLC Computer Systems Design Services Opnet Technologies, Inc Custom Computer Programming Services EMC Corporation-Rockville Computer Systems Design Services DRS Signal Solutions Inc Other Communications Equipment Manufacturing Client Network Services Inc Computer Systems Design Services Hewlett Packard 200 Computer and Computer Peripheral Equipment and Software Merchant Wholesalers Digital Management, Inc Computer Systems Design Services Dataprise Inc Computer Systems Design Services ViaSat Administrative Management and General Management Consulting Services Infozen, Inc Computer Systems Design Services Comtech Mobile Datacom Corporation Custom Computer Programming Services Infozen, Inc Computer Systems Design Services Catapult Technology, Ltd Computer Systems Design Services Abacus Technologies Corporation Computer Systems Design Services 3eTi Technologies Wireless Telecommunications Carriers (except Satel- FCN Technology Solutions 60 Not available Page 6
8 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 7 Employers Company Name Communications Supply Corporation Employment 2012 NAICS NAICS Wireless Telecommunications Carriers (except Satellite) Digital Infuzion, Inc Custom Computer Programming Services TISTA Science and Technology Corporation Computer Systems Design Services Attronica Computers, Inc Computer and Computer Peripheral Equipment and Software Merchant Corporate Network Services, Inc Computer Systems Design Services DRS Defense Solutions Headquarters Other Communications Equipment Manufacturing Fidelis Security Systems, Inc Software Publishers GMV Space Systems, Inc Other Scientific and Technical Consulting Services JackBe Corporation Custom Computer Programming Services Systalex Corporation Computer Systems Design Services Ipx International Systems, Inc. 30 Not available Not available KoolSpan 20 Computer and Computer Peripheral Equipment and Software Merchant Sonatype, Inc. 10 Not available Caelum Research Corporation Custom Computer Programming Services Fedstore Corporation 10 Computer and Computer Peripheral Equipment and Software Merchant SafeNet 10 Not available VariQ Other Computer Related Services Alion Science and Technologly Corp Other Computer Related Services Arxan Technologies Other Computer Related Services Banyan Technology Solutions, In Computer Systems Design Services Advanced Digital Forensic Software Publishers Federal IT Consultants (FEDITC) Computer Systems Design Services Longview International Technology Solutions, Inc. 1 Not available Page 7
9 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 8 Employers Company Name Employment 2012 NAICS NAICS LORE Systems Wired Telecommunications Carriers Aster Engineering, Inc Computer Systems Design Services Triumfant, Inc. 1 Not available Westerly Enterprises Onmicrosoft Computer Systems Design Services Montgomery County Growth Projected Employment Growth 2012 Jobs 38, Jobs 39,767 Change ( ) 1,708 % Change ( ) 4.5% Jobs (2013) 31,851 National Location Quotient: 2.23 % Change ( ) 4.5 Nation: 7.9% Median Earnings $41.06/hr. Nation: $35.89/hr. Page 8
10 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 9 Occupation 2012 Jobs 2015 Jobs Change % Change Computer and Information Systems 2,649 2, % Managers ( ) Management Analysts ( ) 12,030 13,337 1,307 11% Computer and Information Research % Scientists ( ) Computer Programmers ( ) 2,316 2, % Software Developers, Applications ( ) 4,155 4, % Software Developers, Systems Software (15-3,906 4, % 1133) Database Administrators ( % 1141) Network and Computer Systems Administrators 2,500 2, % ( ) Computer Support Specialists ( ) 4,349 4, % Information Security Analysts, Web Developers, and 3,416 3, % Computer Network Architects ( ) Computer Hardware Engineers ( ) % Page 9
11 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 10 Educational programs Four institutions in Montgomery County offer programs for occupations in cybersecurity CIP Code Institution Title Award Level American Career Institute- Wheaton System, Networking, and LAN/WAN Management/Manager 2011 Completions Award of less than 1 academic year DeVry University-Maryland Computer Systems Networking and Telecommunications Masters 1 Management Information Systems, General Masters Montgomery College Computer and Information Sciences, General Associates 33 Computer Programming/Programmer, General Web Page, Digital/Multimedia and Information Resources Design Award of at least 1 but less than 2 academic years 11 Award of at least 1 but less than 2 academic years 2 Web Page, Digital/Multimedia and Information Resources Design Associates 15 Computer Systems Networking and Telecommunications Computer and Information Systems Security/Information Award of at least 1 but less than 2 academic years Assurance Associates 6 Washington Adventist Information University Science/Studies Bachelors Computer Science Bachelors 3 Source: EMSI Workforce Module. ere are 51 institutions in Maryland, 13 institutions in the District of Columbia and 17 institutions of higher education in Northern Virginia that offer cybersecurity related training programs. Page 10
12 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 11
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
More informationWelcome to the NCCoE
1 Welcome to the NCCoE Utilities Telecom Council February 2013! NCCoE! Strategic Plan! Foundations! Partnership! Goals! Business Model! 1! Strategic Plan! Welcome February 2013!!"#$%&'($)*#+*,-.$/0$ 1#/2,3$4.$5"0/3,00$
More informationVirginia s Cybersecurity Industry
Cybersecurity Virginia IT companies, from startups to large systems integrators, are leaders in the development of cyber security solutions for industry and government. Currently 67,850 people work in
More informationComputer Science. Education Report CIP 11.0701. 11,078 9.0% $33.92/hr
Science Science Education Report CIP 11.71 Cochise, Pima, SC CIP 21: A program that focuses on computer theory, computing problems and solut, and the design of computer systems and user interfaces from
More informationProgram Overview. Computer Programming in Los Angeles County, CA. EMSI Q2 2015 Data Set. October 2015
Program Overview Computer Programming in Los Angeles County, CA EMSI Q2 2015 Data Set October 2015 1900 Pico Blvd. Santa Monica, California 90405 310.434.4040 EMSI Q2 2015 Data Set www.economicmodeling.com
More informationComputer Science. Occupation Report CIP 11.0701
Computer Science Computer Science Occupation Report CIP 11.0701 Cochise, Pima, SC CIP 2010: A program that focuses on computer theory, computing problems and solutions, and the design of computer systems
More informationProgram Overview Information Technology in Los Angeles County, CA
Labor Market Information Program Overview Information Technology in Los Angeles County, CA Computer Information Systems TOP Code: 0702.00 CIP Code: 11.0103 1900 Pico Blvd. Santa Monica, California 90405
More informationBridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
More informationCedar Valley Region Labor Market Profile for Information Technology
Cedar Valley Labor Market Profile for Information Technology May 2014 A Skills Ready Report from Cedar Valley al Partnership 10 West Fourth Street, Suite 310 Waterloo, IA 50701 319-232-1156 877-773-9959
More informationComputer Programming Occupation Report CIP 11.0201
Computer Programming Occupation Report CIP 11.0201 Computer Programming/Programmer, General CIP 2010: A program that focuses on the general writing and implementation of generic and customized programs
More informationAn Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
More informationBroward County. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics
L a b o r M a r k e t I n d u s t r y P r o f i l e Broward County Information Technology Industry 2015 Edition Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics Florida
More informationInformation Technology Labor Market Profile for the Cedar Valley Region A Skills Ready Report from
Information Technology Labor Market Profile for the A Skills Ready Report from P.O. Box 65751 West Des Moines, Iowa 50265 515.224.2033 info@smartsolutionsgroup.net - Information Technology Labor Market
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationNational Business Park: Economic Development Case Study. Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661
National Business Park: Economic Development Case Study Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661 May 18 th, 2015 Background and History As the United States
More informationCybersecurity Occupation Report CIP 11.1003
Cybersecurity Occupation Report CIP 11.1003 Pima, SC Computer and Information Systems Security/Information Assurance CIP 2010: A program that prepares individuals to assess the security needs of computer
More informationINFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY
INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY The work of the Talent Pipeline Task Force was inspired by our community s existing assets in the areas of education and workforce. Members
More informationWeb Developer Education Report CIP 11.1004. 1,020 14.9% $30.37/hr
Web Developer Education Report CIP 11.14 Cochise, Pima, SC Web/Multimedia Management and Webmaster CIP 21: A program that prepares individuals to develop and maintain web servers and the hosted web pages
More informationComputer Programming Education Report CIP 11.0201. 9,333 9.7% $31.75/hr
Programming Education Report CIP 11.21 Cochise, Santa Cruz, Pima Programming/Programmer, CIP 21: A program that focuses on the general writing and implementation of generic and customized programs to drive
More informationMassTLC Security Community Advisory Board Meeting JANUARY 15, 2016
MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning
More informationCisco and Linux Networking/Network Technology Occupation Report
Cisco and Linux Networking/Network Technology Occupation Report CIP 11.0901 Pima, Computer Systems Networking and Telecommunications CIP 2010: A program that focuses on the design, implementation, and
More informationComputer Information Systems Education Report CIP 11.0401. 3,929 6.8% $42.50/hr
Information Science/Studies Information Systems Education Report CIP 11.41 Cochise, Santa Cruz, Pima CIP 21: A program that focuses on the theory, organization, and process of information collection, transmission,
More informationHow To Defend Yourself Against Cyber Attacks
Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,
More informationCyber Security Solutions Integrated. Proactive. Resilient.
Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions
More informationCore Challenges in the Market for Cybersecurity Jobs
December 2, 2014 Core Challenges in the Market for Cybersecurity Jobs BHEF National Cybersecurity Workforce Summit Matt Sigelman, CEO Burning Glass Technologies Matching People & Jobs Reemployment & Education
More informationCYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
More informationNetworking and Information Security
Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving
More informationUniversity of Maryland University College 2013 Spring Job Fair & Career Expo
Aflac University of Maryland University College Address: 152 Rollins Avenue Suite 210 Rockville, Maryland 20852 Website: www.aflac.com Position(s): Sales and Marketing Associate, Human Resources and Corporate
More informationCybersecurity Education Report CIP 11.1003. 5,261 10.6% $25.05/hr
Cybersecurity Education Report CIP 11.13 Cochise, Pima, SC CIP 21: A program that prepares individuals to assess the security needs of computer and network systems, recommend safeguard solut, and manage
More informationLinux System Administrator Education Report CIP 11.1001. 6,085 10.2% $28.61/hr
Linux System Administrator Education Report CIP 11.11 Cochise, Pima, SC CIP 21: A program that prepares individuals to manage the computer operat and control the system configurat emanating from a specific
More informationProgram Overview Computer Systems Networking and Telecommunications in Los Angeles County, CA
Labor Market Information Program Overview Computer Systems Networking and Telecommunications in Los Angeles County, CA Computer Networking TOP Code: 0708.10 CIP Code: 11.0901 1900 Pico Blvd. Santa Monica,
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More informationComputer Information Systems Occupation Report CIP 11.0401
Information Science/Studies Computer Information Systems Occupation Report CIP 11.0401 Santa Cruz, Pima CIP 2010: A program that focuses on the theory, organization, and process of information collection,
More informationDepartment of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
More informationSample Career Ladder/Lattice for Information Technology
Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.
More informationTop 20 Occupations, Defense & Security Sector, Metro Denver
Top 20 Occupations, Defense & Security Sector, Metro Denver Applicants 10th 25th 75th 90th SOC 2012 Available Annual Median Average Description per Job Percentile Percentile Percentile Percentile Jobs
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationOklahoma Department of Career and Technology Education
Oklahoma Department of Career and Technology Education Innovative Programs, Research and Development May 2013 Meridian Technology Center Information Technology Career Cluster Report Economic Modeling Specialists,
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationLinux System Administrator Occupation Report CIP 11.1001
Linux System Administrator Occupation Report CIP 11.1001 Pima, Network and System Administration/Administrator CIP 2010: A program that prepares individuals to manage the computer operations and control
More informationFFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
More informationUniversity of Central Florida Class Specification Administrative and Professional. IT ERP Business Analyst Senior
IT ERP Business Analyst Senior Job Code: 2563 Effective Date: 02/20/09 Serve as functional technical lead for modifications and upgrades to multiple enterprise modules. Provide technical guidance and oversight
More informationRECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY
Section 1A Overview RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Hiring Process Overview. This instruction establishes procedures for filling cyber security workforce
More informationSources of Occupational Employment Statistics
Western Technical College 400 Seventh Street La Crosse, Wisconsin 54601 608.785.9200 IT-Network Systems Administration Program Occupation Report June 2014 Western Technical College District Economic Modeling
More informationHow To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
More informationFast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
More informationState of IT Skills Gap
State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationUpdating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT
InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:
More information#HOCOGOESCYBER: A STUDY ON CYBERSECURITY COMPANIES IN HOWARD COUNTY, MARYLAND
ABSTRACT #HOCOGOESCYBER: A STUDY ON CYBERSECURITY COMPANIES IN HOWARD COUNTY, MARYLAND The geographic location of a cybersecurity company may play an important role in its success. The objective of this
More informationInformation and Communications Technology
workforce & economic DEVELOPMENT SANTA MONICA COLLEGE > Supply and Demand for ICT Occupations Information and Communications Technology SANTA MONICA COLLEGE 2014 Contents 1 Executive Summary 2 Introduction
More informationCareers in Management Information Systems
Careers in Management Information Systems In today s high-tech and globally competitive world, effective information systems management plays an important role in business success. However, a critical
More informationHow to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
More informationRedesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC
Redesigning Data System Technology Curricula in the Big Data World IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC Presentation Outline Challenges Phase
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationWalden University s Guide for Information Systems and
Walden University s Guide for Information Systems and Technology Careers Discover Career Opportunities in the Growing Fields of Information Systems and Information Technology Rapid advances in technology
More informationSUMMARY MEETING NOTES July 31, 2013
SUMMARY MEETING NOTES July 31, 2013 To the Montgomery County Cybersecurity Industry Alliance and The Montgomery County Workforce Investment Board Program Planning Committee Facilitated and Prepared by:
More informationWeb Developer Occupation Report CIP 11.1004
Web Developer Occupation Report CIP 11.1004 Cochise, Pima, SC Web/Multimedia Management and Webmaster CIP 2010: A program that prepares individuals to develop and maintain web servers and the hosted web
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationTHE EVOLUTION OF CYBERSECURITY
THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when
More informationMedical Occupation Report - Biology Biomagnetic biomass
Biology Occupation Report CIP 26.0101 Biology/Biological Sciences, General CIP 2010: A general program of biology at the introductory, basic level or a program in biology or the biological sciences that
More informationProtecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
More informationMHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011
100304 INFO SYS TECH:SIMULATION & DIGITAL ENTER Hagerstown Community College Lower Division Certificate 100304 COMPUTER GAMING AND SIMULATION Montgomery College-All Campuses Associate Degree 100304 Count
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationSan Mateo County Community College District College of San Mateo
San Mateo County Community College District College of San Mateo 1700 W. Hillsdale Blvd. San Mateo, California 94402 Occupation Report: Digital Media (DGME) Eight-County San Francisco Bay Area Economic
More informationFlorida. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics
L a b o r M a r k e t I n d u s t r y P r o f i l e Florida Information Technology Industry 2015 Edition Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics Florida Information
More informationComputer Support Specialists and Systems Administrators
http://www.bls.gov/oco/ocos268.htm Computer Support Specialists and Systems Administrators * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections
More informationWhat is Management Responsible For?
What is Management Responsible For? Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf & Company, P.C Regional
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationInformation Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8. Concept of Work
Information Technology Specialists #39110 Page 1 of 16 Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8 Concept of Work This Career Group provides
More informationPOSITION QUALIFICATIONS. Minimum Experience (Yrs)
POSITION QUALIFICATIONS Core Labor Category Skill Minimum Education Minimum Experience (Yrs) Labor Category Description Technical Manager, Principal Bachelors Degree 12 Technical Manager, Senior Bachelors
More informationNational Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationProfessional and Business Services Employment Trends in the Richmond MSA
Professional and Business Services Trends in the Richmond MSA Prepared for Resource Greater Richmond, Virginia Professional and Business Services Trends in the Richmond MSA Key Findings The Professional
More informationEngineering Technology Occupation Report CIP 14.4201
Engineering Technology Occupation Report CIP 14.4201 Pima, Mechatronics, Robotics, and Automation Engineering CIP 2010: A program that prepares individuals to apply mathematical and scientific principles
More informationInformation Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer
More informationStrategic Possibility Report Los Angeles County. Accounting. Center of Excellence for Los Angeles
Strategic Possibility Report Los Angeles County Accounting Center of Excellence for Los Angeles Hosted at the Los Angeles Community College District September 2007 Strategic Possibility Summary for Los
More informationGAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
More informationNW Systems, Inc. Corporate Overview. 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com
NW Systems, Inc. Corporate Overview 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com SUMMARY Founded in 1996 ; Professional Services Firm Supporting US Government and Commercial Clients
More informationPOSITION SPECIFICATION. President. Northern Virginia Community College. Preamble
POSITION SPECIFICATION President Northern Virginia Community College Preamble The Virginia Community College System provides programs and courses of instruction, through the associate degree level, encompassing
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationGame Design. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc.
Game Design Regional Program Demand Report Santa Monica College, LA MSA Economic Modeling Specialists Inc. Introduction and Contents Contents Executive Summary Job Outlook Summary Inverse Staffing Patterns
More informationhttp://www.bls.gov/oco/ocos267.htm Computer Software Engineers
http://www.bls.gov/oco/ocos267.htm Computer Software Engineers * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data
More informationProposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
More informationSOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs
SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationThe Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
More informationIT - Computer Support Specialist
IT - Computer Support Specialist Five Year Trend Five Year Enrollment Change 43.9% FY 2008 FTEs 37.90 Five Year FTEs Change 34.1% FY 2009 FTEs 29.73 Five Year Graduate Change 20.0% FY 2010 FTEs 46.47 FY
More information2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA
Summary In FY2014-15, goals for the CIO areas were aligned around two areas: the Cornerstone Plan (particularly Pillar V, Organizational Excellence, and Pillar II, Research Infrastructure and Services)
More informationEmployment Data For the United States of America
Entrepreneurship/Small Business Management Occupation Report CIP 52.1801 Sales, Distribution, and Marketing Operations, General CIP 2010: A program that focuses on the general process and techniques of
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationApply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /
More informationWhy Certify? Why IT? Brian Matzelle
Why Certify? Why IT? Brian Matzelle CompTIA Academy Team Alan Rowland Business Development Director Brian Matzelle Education Sales Senior Manager Jill Thielmann Manager, Inside Sales Kirk Smallwood Senior
More informationFlorida. Information Technology Industry. Source: Florida Agency for Workforce Innovation, Bureau of Labor Market Statistics Center
L a b o r M a r k e t I n d u s t r y P r o f i l e Florida Information Technology Industry Source: Florida Agency for Workforce Innovation, Bureau of Labor Market Statistics Center Florida Information
More informationSECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
More informationComputer Science. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc.
Computer Science Regional Program Demand Report Santa Monica College, LA MSA Economic Modeling Specialists Inc. Introduction and Contents Contents Executive Summary Job Outlook Summary Inverse Staffing
More informationCisco and Linux Networking/Network Technology Education Report. 5,789 11.6% $27.14/hr
Cisco and Linux Networking/Network Technology Education Report CIP 11.91 Cochise, Pima, SC CIP 21: A program that focuses on the design, implementation, and management of linked systems of computers, peripherals,
More informationCybersecurity for Medical Devices
Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick
More informationCisco Networking Academy: Alabama Profile
Cisco Networking Academy: Alabama Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with
More information