National Initiative for Cybersecurity Education



Similar documents
National Initiative for Cyber Security Education

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

NICE and Framework Overview

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

Strategic Plan September 2012

Introduction to NICE Cybersecurity Workforce Framework

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Shaping the Future of Cybersecurity Education

Introducing... FedVTE and FedCTE

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

DEPARTMENT OF COMMERCE OFFICE OF HUMAN RESOURCES MANAGEMENT HUMAN RESOURCES (HR) BULLETIN #201, FY15

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

National Initiative for Cybersecurity Education

NICE Cybersecurity Workforce Framework Tutorial

Preventing and Defending Against Cyber Attacks June 2011

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation

September 24, Mr. Hogan and Ms. Newton:

Preventing and Defending Against Cyber Attacks November 2010

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

CyberSkills Management Support Initiative

Strategic Progress Update July 2014 March 2015

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Cybersecurity in the States 2012: Priorities, Issues and Trends

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

The Comprehensive National Cybersecurity Initiative

Department of Homeland Security

Department of Homeland Security Federal Government Offerings, Products, and Services

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Small Business. Leveraging SBA IT resources to support America s small businesses

Operationally Focused CYBER Training Framework

DHS. CMSI Webinar Series

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Cybersecurity Framework: Current Status and Next Steps

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Participants: Introduction:

Water Security in New Jersey: Partnership and Services

CHIEF INFORMATION OFFICERS COUNCIL

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Middle Class Economics: Cybersecurity Updated August 7, 2015

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

KEY TRENDS AND DRIVERS OF SECURITY

Cybersecurity High School and Beyond

Department of Defense Cyberspace Workforce Strategy. December 4, Approved for public release: distribution unlimited.

Cyber Education triangle clarifying the fog of cyber security through targeted training

Cybersecurity Strategic Talent Management. March, 2012

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C October 30, 2015

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

Table of Contents. FY BLS Strategic Plan Our Strategies and Goals Strategy Framework Strategy 1 (Products)...

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Homeland Open Security Technology (HOST)

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW

Information Systems Security Line of Business (ISS LoB)

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

An Overview of Large US Military Cybersecurity Organizations

FFIEC Cybersecurity Assessment Tool

FEDERAL WORKFORCE. OPM and Agencies Need to Strengthen Efforts to Identify and Close Mission-Critical Skills Gaps

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

DHS IT Successes. Rationalizing Our IT Infrastructure

Actions and Recommendations (A/R) Summary

NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

No. 33 February 19, The President

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Becoming a Cyber Professional: A Discussion with Recent Graduates

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Billing Code: 3510-EA

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

DEPARTMENT OF THE NAVY. Civilian Cybersecurity Workforce

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

U.S. DEPARTMENT OF TRANSPORTATION

Transcription:

ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch (CE&A)

Overview NICE 2.0 NICE Lead Transition Leadership transition Jan 14 Oct 14 Ernest Detailed to DHS Rebranding of NICE Enhance Public Awareness Expand the Pipeline Evolve the Field Key Initiatives FY 14-20 Discussion 2

NICE 2.0 Transition 1. Period through Oct 2014 a. OSTP, NIST, DHS Transition Strategy Mtg Jan 14 b. White House Cyber IPC Transition Briefing Apr 14 c. Quarterly updates 2. Ernest will continue role through his retirement, office will move to DHS/NPPD/CS&C/SECIR 3. NICE Strategic Plan updated Q1 FY15 4. Annual NICE workshop Sept 14 3

NICE 2.0 Leadership NICE Lead R. Montana Williams, DHS Senior NICE Advisor Dr. Ernest McDuffie, NIST Component 1: Enhance Awareness Kristina Dorville, DHS Component 2: Expand the Pipeline Douglas Maughan, DHS Victor Piotrowski, NSF Camsie McAdams, DoED Component 3: Evolve the Field Roy Burgess, DHS Pamela Frugoli, DOL Stephanie Keith, DoD 4

NICE Rebranding (Exec Summary) 1. Enhance Public Awareness DHS a. Increase Awareness of Critical Infrastructure & Key Resources (CIKR) b. Increase key stakeholder support to national awareness programs 2. Expand the Pipeline (NSF/DoEd/DHS) a. Promote cybersecurity-related STEM efforts focused on teacher professional development, student interaction, & cyber competitions b. Target key populations (e.g., minorities, women, veterans) c. Promote performance-based education & certification 3. Evolve the Field (DoD, DHS, DoL) a. Institutionalize the NCWF in federal gov t; expand to SLTT b. Determine national workforce development and training gaps c. Coordinate development of a performance-base training & assessment environment (e.g., cyber range) 5

Key Initiatives Expand White House participation in NICE Incorporate media/social media to expand awareness Incorporate CIKR messaging and outreach in NSCAM Promote strategies to increase entry of target groups (Vets, minorities, and women) into cybersecurity workforce pipeline Evaluate feasibility of a national cybersecurity accreditation body Expose 1.7M high school students to cybersecurity opportunities through teacher professional development, academic consortiums, competitions, & mentoring programs Expand FedVTE and FedCTE to SLTT & Critical Infrastructure partners Complete a national cybersecurity workforce assessment Partner w/dol, OPM, BLS to create standard occupational classification Establish an interagency on-demand cyber range 6

The cyber threat landscape 7

Why can t we all just be N.I.C.E.? The National Initiative for Cybersecurity Education (NICE) was established to raise national cybersecurity awareness, broaden the pool of cyber workers through strong education programs, and build a globally competitive cybersecurity workforce. NICE was launched in March 2010 in response to national directives; born from the Comprehensive National Cybersecurity Initiative (CNCI) (of 2008), recommendation #8 NICE is a nationally-coordinated effort comprising over 20 federal departments and agencies that focuses on cybersecurity awareness, education, training and professional development. 8

Structure Three components R. Montana Williams, DHS Dr. Ernest McDuffie, NIST Kristina Dorville, DHS Douglas Maughan, DHS Victor Piotrowski, NSF Camsie McAdams, DoED Roy Burgess, DHS Pamela Frugoli, DOL Stephanie Keith, DoD 9

Cybersecurity is not homebuilding Training Certification Employers 10

The cyber threat landscape 11

U.S. IT Workforce Statistics According to the U.S. Bureau of Labor Statistics, there are approximately 4.0 million people employed in the U.S. IT labor workforce. Percentage of IT Workers by Sector Percentage of IT Workers by Technology Domain 5% 5% 3% 4% 100% 90% 80% 20% Application Development Application Support 82% 70% 17% Data Center 60% End-User Computing 16% 50% IT Service Desk 40% 12% IT Management PRIVATE SECTOR SELF-EMPLOYED FEDERAL GOV'T 30% 20% 10% 0% 9% 8% 8% 5% 5% Data Network Finance and Administration Voice Network *Source: CompTIA Colloquium 2012 - U.S. IT Market Supply and Demand Briefing 12

The Solution NICE developed the National Cybersecurity Workforce Framework (the Framework) to codify cybersecurity work and to identify the specialty areas of cybersecurity professionals. The Framework establishes: A common taxonomy and lexicon which organizes cybersecurity work into 31 specialty areas within 7 categories. A baseline of tasks, specialty areas, and knowledge, skills and abilities (KSAs) associated with cybersecurity professionals. The Framework assists with strategic human capital efforts, including: Workforce Planning Recruitment and Selection Training and Development Succession Planning 13

Framework Categories and Specialty Areas The Framework s 31 Specialty Areas (SA), organized into 7 Categories, encompass the entirety of national cybersecurity work. Organizations can use the SAs to identify, build, and customize cybersecurity roles based on mission requirements. Investigate Digital Forensics Collect and Operate Collection Operations Cyber Operations Planning Analyze Cyber Threat Analysis All Source Intelligence Targets Protect and Defend Computer Network Defense (CND) Vulnerability Assessment and Management Incident Response Oversight and Development Legal Advice and Advocacy Education and Training Strategic Planning and Policy Information Systems Security Operations Operate and Maintain System Administration Network Services Customer Service and Technical Support Systems Security Analysis Data Administration Securely Provision Systems Requirement Planning Systems Development Software Assurance and Security Engineering Technology Research and Development Test and Evaluation Systems Security Architecture Investigation Cyber Operations Exploitation Analysis CND Incident Response Security Program Management (CISO) Knowledge Management Information Assurance (IA) Compliance 14

Benefits of Using the Framework When degrees, jobs, training and certifications are aligned to the Workforce Framework Colleges can create programs that are aligned to jobs Students will graduate with knowledge and skills that employers need Employers can recruit from a larger pool of more qualified candidates Employees will have a better defined career path and opportunities Policy makers can set standards to promote workforce professionalization 15

And it s required 16

The National Initiative for Cybersecurity Careers and Studies (NICCS ) Portal The Nation s one-stop-shop for cybersecurity careers and studies Interactive Workforce Framework Searchable Training Catalog Framework implementation how-to guide Stop-Think-Connect awareness materials Teaching & workforce development tools News and events www.niccs.us-cert.gov 17

A few best practices Use 3 digits to capture granularity Track people as well as positions Search by task, not title Leverage NICCS and FedVTE Develop career paths aligned to Framework Promote Framework adoption Get involved! 18

Questions? NICE will continue to share materials with cybersecurity professionals across the nation in the public, private, and academic sectors. For questions about NICE, the Framework, and other initiatives, please contact: The NICCS Supervisory Office (SO): NICCS@hq.dhs.gov Visit the Framework here: http://niccs.us-cert.gov/training/tc/framework Visit NICCS here: www.niccs.us-cert.gov 19