NICE Cybersecurity Workforce Framework Tutorial
|
|
|
- Donna Augusta Richard
- 10 years ago
- Views:
Transcription
1 NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS
2 Outline for Today Introduction to NICE NICE Workforce Plan Overview Introduction to the Cybersecurity Workforce Framework Exercise 1: Review of the Framework Case Study: DHS Pilot Implementation Exercise 2: Linking Training to the Framework Call to Action 2
3 Introduction to NICE The National Initiative for Cyber Security Education (NICE) is a nationally coordinated effort focused on cybersecurity awareness, education, training, and professional development. The mission of NICE is to enhance the overall cybersecurity posture of the United States by accelerating the availability of educational and training resources designed to improve the cyber behavior, skills, and knowledge of every segment of the population, enabling a safer cyberspace for all. 3
4 NICE Component 4 Workforce Training and Professional Development This component is responsible for: defining the cybersecurity workforce; and identifying the training and professional development required for the nation s cybersecurity workforce. Lead by the DoD, ODNI and DHS, in coordination with academia, industry and state, local and tribal governments. 4
5 Understanding the Cybersecurity Workforce We need the answers to questions such as: Who is a cybersecurity professional? Do we know in our Federal Government employee population, who works in cybersecurity and what their capabilities are? How many cybersecurity professionals receive annual performance awards in comparison to professionals in other occupations? What is the average starting salary of an System Architect within various Federal Government organizations? How does this compare to private industry? What are the average promotion rates of different cybersecurity specialties compared to one another and to other occupations? What are the attrition rates? Etc. 5
6 NICE Workforce Plan Overview 6
7 Need for Standardization Today, there is very little consistency throughout the Federal Government and the Nation in terms of how cybersecurity work is defined, described, and how the workforce is trained. Establishing and implementing standards for cybersecurity workforce and training is a foundational component for every workforce plan. 7
8 Component 4 Work Plan Task Overview Task 1 Population Review Defining the Workforce The Framework Task 2 Training Catalog Identifying the Training Per Level Task 3 Workforce Baseline Study Assess the Quality Task 4 Workforce & Training Analysis (Identification of gaps in capabilities and available training) Identification of Gaps Task 5 Professional Development Roadmaps The Pipeline Task 6 - Communication 8
9 Federal Department and Agency Support Over 20 Federal Departments and Agencies participated to develop the framework, including: Department of State Department of Education Department of Labor Office of Management and Budget Office of Personnel Management Department of Defense Department of Justice Information Sciences & Technologies Department of Homeland Security (including NPPD, TSA, USSS, Coast Guard, ICE, CBP, CIS, DHS OI&A). Central Intelligence Agency Defense Intelligence Agency Director of National Intelligence Federal Bureau of Investigation National Security Agency National Science Foundation Department of Defense /DC3x National Counterintelligence Executive Federal CIO Council 9
10 Non-Profit & Government Organizations In addition, NICE has worked very closely with non-profit and governmental organizations to socialize the framework. Including, but not limited to: FedCIO Council IT Work Force Committee (ITWFC) Committee of National Systems Security (CNSS) FedCIO Council Information Security and Identity Management Committee (ISIMC) National Cybersecurity Alliance (NCSA) Federal Information Systems Security Educators Association (FISSEA) Colloquium for Information Systems Security Educators (CISSE) Colloquium for Advanced Cybersecurity Education (CACE) Washington Cyber Roundtable CyberWatch US Cyber Challenge National Association of State Chief Information Officers (NASCIO) Multi-State Information Sharing and Analysis Center (MS-ISAC) Information Systems Security Association (ISSA) National Board of Information security Examiners (NBISE) Cybersecurity Certification Collaborative (C3) Institute for Information Infrastructure Protection (I3P) Association for Computing machinery (ACM) Institute of Electrical and Electronics Engineers (IEEE) 10
11 Cybersecurity Workforce Framework 11
12 1 Framework Development Process Conducting Internet searches and collecting documents (reports, websites, briefings, etc.) from across the government related to workforce constructs such as: Computer network defense (CND) service provider organizations, Computer network operations (CNO), Cyber investigation, Cybersecurity, Counterintelligence, Counterintelligence in Cyberspace, IT infrastructure, operations, development and information assurance Refine existing definitions of cybersecurity specialty areas based on collected information Conduct focus groups with subject matter experts to identify and define specialty areas not noted in previous documents New specialty areas included Investigation, Technology Demonstration, Information Systems Security Management, etc. 2 Sample reviewed documents included: Some of the reviewed documents were: Office of Personnel Management s occupational standards (OPM, 2010), Job descriptions from the Department of Labor s O*NET database (2010), DoD M Information Assurance Workforce Improvement Program (DoD, 2010), DoD Cybersecurity Workforce Framework, DoD Counterintelligence in Cyberspace Training and Professional Development Plan, Federal Cybersecurity Workforce Transformation Working Group Report on Cybersecurity Competencies Review existing task and KSA statements that define the work within specialty areas. Identify, collect, write new task and KSA statements where appropriate. Gather SME input on task and KSA statements. Refine framework as necessary through workshops, meetings, and stakeholder input. ongoing 12
13 Framework Categories The Framework organizes cybersecurity into seven high-level categories, each comprised of several specialty areas. 13
14 7 Categories Each Comprising Several Specialty Areas Securely Provision Operate and Maintain Protect and Defend Investigate Operate and Collect Analyze Support Specialty areas concerned with conceptualizing, designing, and building secure IT systems. Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security. Specialty area responsible for the identification, analysis and mitigation of threats to IT systems and networks. Specialty areas responsible for the investigation of cyber events or crimes which occur within IT Systems and networks. Specialty areas responsible for the highly specialized and largely classified collection of cybersecurity information that may be used to develop intelligence. Specialty area responsible for highly specialized and largely classified review and evaluation of incoming cybersecurity information. Specialty areas that provide critical support so that others may effectively conduct their cybersecurity work. 14
15 Example Category and its Specialty Areas So What else do I get? 15
16 Category: Operate and Maintain Specialty Area: Systems Security Analysis Responsible for the integration/testing, operations and maintenance of systems security Typical OPM Classification: 2210, Information Technology Management (Actual information provided by OPM) Example Job Titles: Information Assurance Security Information System Security Information Systems Security IA Operational Engineer Job Tasks 1. Implement system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation. 2. Implement approaches to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed. 3. Perform security reviews and identify security gaps in security architecture resulting in recommendations for the inclusion into the risk mitigation strategy. 4. Etc.. Competency Information Assurance: Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality and integrity. Risk Management: Knowledge of the principles, methods, and tools used for risk assessment and mitigation, including assessment of failures and their consequences. System Life Cycle: Knowledge of systems life cycle management concepts used to plan, develop, implement, operate and maintain information systems. KSA Skill in determining how a security system should work. Knowledge of security management Knowledge of Information Assurance principles and tenets. Knowledge of risk management processes, including steps and methods for assessing risk. Knowledge of network access and authorization (e.g. PKI) Skill in, assessing the robustness of security systems and designs. Knowledge of system lifecycle management principals. Knowledge of how system components are installed, integrated and optimized. Skill in designing the integration of hardware and software solutions. 16
17 Exercise 1: Review of the Cybersecurity Workforce Framework 17
18 Overall Framework Review General Overview What does the NICE Cybersecurity Workforce Framework cover? What is a specialty area? Let s Begin Part 1: Take 5-10 minutes to independently review the paint chip booklet Look at the overall structure of categories and the specialty areas within them Read the definitions of the each specialty area and consider how well it fits into the category 18
19 Questions to Consider Can you identify a specialty area that describes your primary job responsibilities? Are the specialty areas appropriately grouped within each major category (i.e., Securely Provision, Operate and Maintain, Protect and Defend, etc.)? What specialty areas are missing? Should any specialty areas should be deleted? 19
20 Part 2 Specialty Area Deep Dive Review Group 1 Independent review of Tasks/KSAs Group 2 Group discussion of Information Systems Security Management, Security Program Management, and Strategic Planning and Policy Development Group 3 IT Program Management Small Group Facilitators will provide additional Guidance 20
21 Case Study: DHS Pilot Implementation 21
22 DHS Cyber Workforce Initiative The Secretary of the Department of Homeland Security has identified the acquiring, growing, and sustaining of a cyber workforce as one of the Department s priorities The cyber security mission of DHS will require a federal workforce that possesses the necessary skills to lead cybersecurity missions and solutions, while ensuring the future security of the national critical infrastructure In response, the Office of the Chief Human Capital Officer (OCHCO) and the National Protection and Programs Directorate (NPPD) has established a crosscomponent team responsible for the development of this initiative 22
23 Eating a Pack of Elephants With all the organizational considerations in building and sustaining a Cyber Workforce for DHS, where should we start? Strategic Plan 4 Major Goals Identify parameters for building an effective, mission-focused cybersecurity workforce; Recruit highly qualified cybersecurity workforce professionals and leaders; Grow individual and organizational capabilities to promote a highlyqualified workforce; and Sustain an engaged cybersecurity workforce and leadership cadre by sharing institutional knowledge and promoting a unified DHS culture Implementation 23
24 Implementation: First Steps To start, Cyber Workforce Development is focused on defining Capability needs, which is accomplished by building competency models Why Cyber Competency Models? Objective: Competencies define the skills/capabilities critical for successful job performance across Cyber roles, and the behaviors that exemplify the progressive levels of proficiency associated with these competencies Impact: Provides a solid foundation upon which targeted recruitment, selection, and employee development (learning and training) initiatives can be built to increase Cyber Workforce capabilities What makes a Competency Model? Competencies Behavioral Indicators Competency Customer Service and Technical Support: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Behavioral Indicator (BI) Basic (BI) Intermediate (BI) Advanced (BI) Configures change requests with guidance by reviewing request, determining whether request is valid/reasonable, communicating with user if necessary, and by making the appropriate changes in the system Provides guidance on configuring change requests by creating training and written documents (e.g., manuals) in a clear format for staff on how to complete change requests Definition Conducts brown bag sessions (term used for internal training), training users on how to use various tools and products (how to run queries, generate reports) Provides approval/disapproval on role-based access/content/active channel requests by reviewing whether requests comply with organizational standards and procedures Delegates change actions to the systems engineers by creating clear instructions on how to implement the actions and by outlining a project timeline with expectations for implementing the changes Penetration Testing Designs, simulates, and executes attacks on networks and systems. Leverages existing and emerging methods to attack systems and exploit vulnerabilities. Documents penetration testing methodology, findings, and resulting business impact. 24
25 Implementation: Challenges How do we minimize the time impact on the managers, supervisors and SMEs? How do we ensure consistency in terminology across all agencies and components? Who are the DHS Cybersecurity professionals? What competency work has been accomplished? With so many Occupational Series involved with Cybersecurity, how should the models be built? 25
26 A NICE Solution Although we still have some outstanding challenges, the NICE Framework presented an exceptional solution for time and consistency. Using the framework as a foundation, DHS can Compile initial technical competency models in a compressed timeframe Maintain consistency in terminology across all agencies and components, as well as alignment with NICE and OPM 26
27 Rollout Experience: The story we had to tell People need/want to know where the Framework came from and why it was developed The Comprehensive National Cybersecurity Initiative Initiative #8 requires building a national Cyber Workforce and serves as the foundation for the National Initiative Cybersecurity Education (NICE) 27
28 Rollout Experience: The story we had to tell Helpful to highlight the comprehensive nature of NICE Framework Made up of multiple components, NICE Component 4 focuses on the standards and development of the Federal Cyber Workforce Component 4: Cybersecurity Workforce Training and Professional Development Functional Area 1: General IT Use Functional Area 2: IT Infrastructure, Operations, Maintenance, and Information Assurance Functional Area 3: Domestic Law Enforcement and Counterintelligence Functional Area 4: Specialized Cybersecurity Operations This effort reaches across the Federal Government with included support from DHS, OSTP, ODNI, NSA, DoD, OPM, and NIST 28
29 What are Competency Models? Nuts and Bolts CYBER ROLE Cybersecurity Tester: The Cybersecurity Tester provides compliance-based security testing leveraging automated tools. The Cybersecurity Tester assists in the preparation, development, modification, and management of security products in support of the C&A process. The Cybersecurity Tester provides technical analysis and automated scans to assess their completeness and identify system vulnerabilities and weaknesses. CYBER SKILLS Systems Requirements Analysis Testing Vulnerability Assessment Threat Assessment Penetration Testing Certification & Accreditation Secure Network Design BEHAVIORAL INDICATORS SYSTEMS REQUIREMENTS ANALYSIS: Translates functional security requirements into secure design technical and operational specifications. Reviews requirements documentation to determine security impact and requirements. Conducts security risk assessments and business impact analyses to detect weaknesses and depth/breadth of security controls needed. Evaluates current state of security systems, processes, and controls. Performs gap analyses and makes recommendations for gap mitigation. Proficiency Level 1 Proficiency Level 2 Proficiency Level 3 Performs technical planning, system integration, verification and validation, and supportability and effectiveness analyses for total systems Analyzes all levels of total system Leads the definition and flow-down functional, performance, and design requirements Performs functional analysis, timeline analysis, requirements allocation, and Advises on new techniques and estimated costs associated with new or revised programs and utilities, taking into consideration personnel, time, and hardware requirements products to include: acquisition, interface definition studies to translate Interprets mission objective and concept, design, test, installation, operation, maintenance, and disposal Translate operational requirements into technical requirements Organizes and analyzes stated requirements into categories throughout the system lifecycle such as functionality, usability, performance, customer requirements into hardware and software specifications Distinguishes testable requirements Conducts gap analyses between requirements and proposed architecture to identify security performance and other weaknesses in the system applies knowledge to requirements and implementations Advices customer of gaps in security policy and guidance; provides recommendations Monitors industry developments and evolving instruction/policy/guidance on IT security concerns operational, security, etc. Verifies security requirements through Oversees large-scale requirements Proficient at using a requirements management tool (e.g.. DOORS) Identifies and documents security requirements collaboration with DAA/IA/Engineering & Systems Administration Conducts vulnerability & risk assessment analyses development and management efforts to include the definition of new requirements and the implementation of changes to existing requirements. PERFORMANCE STANDARDS CYBER SKILL & PROFICIENCY STANDARDS Systems Requirements Analysis PERFORMANCE LEVEL INT EXP FEL Testing Vulnerability Assessment Threat Assessment Penetration Testing Certification & Accreditation Secure Network Design
30 Applying the NICE Framework DHS SPECIFIC CYBER ROLE Cybersecurity Tester: The Cybersecurity Tester provides compliance-based security testing leveraging automated tools. The Cybersecurity Tester assists in the preparation, development, modification, and management of security products in support of the C&A process. The Cybersecurity Tester provides technical analysis and automated scans to assess their completeness and identify system vulnerabilities and weaknesses. SPECIALTY AREAS Systems Requirements Planning Test and Evaluation Investigation Computer Network Defense Selected by Component SMEs from NICE Framework Specialty Areas BEHAVIORAL INDICATORS SYSTEMS REQUIREMENTS ANALYSIS: Translates functional security requirements into secure design technical and operational Built specifications. by SMEs Reviews requirements with alignment documentation to determine to respective security impact and requirements. Conducts security risk assessments and business impact analyses to detect weaknesses and depth/breadth of security controls needed. Evaluates current state of security systems, processes, and controls. NICE Framework KSAs Performs gap analyses and makes recommendations for gap mitigation. Proficiency Level 1 Proficiency Level 2 Proficiency Level 3 Performs technical planning, system integration, verification and validation, and supportability and effectiveness analyses for total systems Analyzes all levels of total system Leads the definition and flow-down functional, performance, and design requirements Performs functional analysis, timeline analysis, requirements allocation, and Advises on new techniques and estimated costs associated with new or revised programs and utilities, taking into consideration personnel, time, and hardware requirements products to include: acquisition, interface definition studies to translate Interprets mission objective and concept, design, test, installation, operation, maintenance, and disposal Translate operational requirements into technical requirements Organizes and analyzes stated requirements into categories throughout the system lifecycle such as functionality, usability, performance, customer requirements into hardware and software specifications Distinguishes testable requirements Conducts gap analyses between requirements and proposed architecture to identify security performance and other weaknesses in the system applies knowledge to requirements and implementations Advices customer of gaps in security policy and guidance; provides recommendations Monitors industry developments and evolving instruction/policy/guidance on IT security concerns operational, security, etc. Verifies security requirements through Oversees large-scale requirements Proficient at using a requirements management tool (e.g.. DOORS) Identifies and documents security requirements collaboration with DAA/IA/Engineering & Systems Administration Conducts vulnerability & risk assessment analyses development and management efforts to include the definition of new requirements and the implementation of changes to existing requirements. PERFORMANCE STANDARDS CYBER SKILL & PROFICIENCY STANDARDS Systems Requirements Planning PERFORMANCE LEVEL INT EXP FEL Test and Evaluation Investigation Computer Network Defense
31 Impact of DHS use of NICE Framework Accelerated role specific model development cycle time Establishing consistency in terminology across all DHS agencies and components Alignment with NICE efforts and future NICE related programs Real time feedback from field on framework back to NICE 31
32 Exercise 2: Linking Training To the Framework 32
33 Why map competencies to training courses? Effectiveness ensure that training has right content at right level to support needed competencies optimize usefulness of training enable a robust number of variables to be used for search capabilities to enable very targeted searches to identify applicable/relevant training Efficiency allocate training resources to most benefit eliminate unnecessary redundancy in courses facilitate use of courses to greatest extent possible 33
34 Guiding principles Competencies and other job-related information to course mappings, in addition to all other required training course information, are an important foundation Completing the mapping according to common lexica and taxonomies adds exponentially greater value Ideally mapping is done by Subject Matter Experts Mapping is not just an exercise especially in time of increasing scarcity of resources 34
35 Process - Mapping Existing Courses to Job Information 1 st Identify courses to be mapped. May start with a mission critical occupation (e.g., cybersecurity) or by IC element (e.g., DIA) 2 nd Ensure information about the course is available so that it can be accurately mapped (e.g., has learning objectives documented) 3 rd Process of successive approximations - - map all fields to the greatest extent possible and with the highest level of consistency/accuracy 4 th Review and establish a quality assurance process 35
36 Session Format Linking Courses: What You ll Need Example Group Exercise 36
37 What do you need? Things The Cybersecurity Workforce Framework Must have Specialty areas with complete descriptions KSAs/Competencies Job titles (helpful for SMEs) Training Courses Must have Title Description Other data considered in aggregate Objectives Target audience Pre-requisites Number in a series (e.g., 1 of 6) Worksheets to record linkages 37
38 What do you need? People Subject Matter Experts Must have Knowledge of course content OR Can become expert in course content through Review of materials Audit course Ideal SME is the ISD or instructor of that training Preferably 2-3 SMEs Supports reliability & validity of linkages Facilitator Must have Familiarity with the process, purpose Ability to guide SME, either In person Remotely 38
39 Example from a Facilitated Session The output shown here came from a facilitated SME session with a cybersecurity training provider from academia These samples illustrate a portion of the populated worksheet from Step 1 of the process. Links are shown between six courses and four specialty areas (formerly work roles ) Note: SMEs were also asked to indicate the level of the intended audience for each course, and type of learning 39
40 Example from a Facilitated Session continued This is an example of the populated framework completed during Step 2 of the process. This sample illustrates that several of the provider s courses support the KSAs within the Specialty Area Education and Training Note: Several of these courses support multiple KSAs within this specialty area These linkages, captured in this worksheet, are then entered into the online Cybersecurity Training Catalog 40
41 Now Let s Try It Your Table Group Will Test the Linkage Process Scenario-based Exercise Supporting Materials We ll Answer Questions Time 41
42 Task Guidance To begin, focus on 1 specialty area Using the Framework, take a close look at the KSAs that comprise that specialty area Apply your expertise (the course information provided) to identify those KSAs that you think are covered in the course On the worksheet, write in the KSAs you have identified Repeat the process, selecting KSAs for the remaining 2 specialty areas 42
43 Wrap up How did you do? The actual linkages are 43
44 Call to Action Help advance the Framework! Provide your input for what we missed, either current or futureoriented Adopt the Cybersecurity Workforce Framework If you have existing competency data for cybersecurity within your organization, first map to the framework and then adopt the new labels and definitions Volunteer to be a Linkage Expert for Cataloging Cybersecurity Training Work with us to get your courses cataloged and linked to the Framework Spread the Word Promote awareness and adoption across the federal government and the Nation 44
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK USER GUIDE Employers Workforce Framework User Guide Welcome to the User Guide! The Workforce Framework helps Employers to recruit from a larger pool of more
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
CHIEF INFORMATION OFFICERS COUNCIL
CYBERSECURITY WORKFORCE DEVELOPMENT MATRIX RESOURCE GUIDE October 2011 CIO.GOV Workforce Development Matrix Resource Guide 1 Table of Contents Introduction & Purpose... 2 The Workforce Development Matrix
workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework
introduction The National Initiative for Cybersecurity Education (NICE) is a nationally coordinated effort focused on cybersecurity awareness, education, training, and professional development. Two Executive
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Strategic Plan September 2012
Strategic Plan September 2012 NIST NICE Component Leads Overall Lead Ernest L. McDuffie, Ph.D. Lead for the National Initiative for Cybersecurity Education (NICE) United States Department of Commerce (DoC)
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Department of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
Department of Defense INSTRUCTION. DoD Civilian Personnel Management System: Volume 250, Civilian Strategic Human Capital Planning (SHCP)
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 250 November 18, 2008 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Volume 250, Civilian Strategic Human Capital Planning (SHCP) References:
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
DEPARTMENT OF COMMERCE OFFICE OF HUMAN RESOURCES MANAGEMENT HUMAN RESOURCES (HR) BULLETIN #201, FY15
Approved for Release Kevin E. Mahoney Director for Human Resources Management and Chief Human Capital Officer DEPARTMENT OF COMMERCE OFFICE OF HUMAN RESOURCES MANAGEMENT HUMAN RESOURCES (HR) BULLETIN #201,
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Shaping the Future of Cybersecurity Education
Shaping the Future of Cybersecurity Education Is N.I.C.E. NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) February 2011 THEPRESENT Comprehensive National Cybersecurity Initiative Training the existing
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA
The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
Professional Level Public Health Informatician
Professional Level Public Health Informatician Sample Position Description and Sample Career Ladder April 2014 Acknowledgements Public Health Informatics Institute (PHII) wishes to thank the Association
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
Threats to Local Governments and What You Can Do to Mitigate the Risks
Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Evaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE. This manual: a. Provides accreditation guidance
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503. October 30, 2015
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 October 30, 2015 Executive Summary Strengthening the cybersecurity of Federal networks, systems, and data is one
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
FLORIDA DEPARTMENT OF CORRECTIONS 2013-2016 STRATEGIC PLAN
FLORIDA DEPARTMENT OF CORRECTIONS 2013-2016 STRATEGIC PLAN Changing Lives To Ensure a Safer Florida FLORIDA DEPARTMENT OF CORRECTIONS 2013-2016 STRATEGIC PLAN TABLE OF CONTENTS Introduction.... 2 Vision,
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010
Information Security Workforce Development Matrix Initiative FISSEA 23 rd Annual Conference March 23, 2010 Professionalization of the Workforce The CIO Council s IT Workforce Committee partnered with Booz
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
I. Purpose - 1 MD # 0005
Department of Homeland SecUl ity Management Directives System MD Number: 0005 Issue Date: 10/28/2004 FINANCIAL MANAGEMENT LINE OF BUSINESS INTEGRATION AND MANAGEMENT I. Purpose This Management Directive
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
