Committee Task. Committee Statement of Task (Key components) Broader DHS Context (from NICCS portal)

Similar documents
Fast Facts About The Cyber Security Job Market

Cybersecurity High School and Beyond

FISSEA March 20, 2013 Kathy Roberson SFS Program Manager

The Framework. The evaluation framework and model for change are focused on graduate student affairs, including:

National Initiative for Cybersecurity Education

Northrop Grumman Cybersecurity Research Consortium

Academic and Professional Degree Students

EvaluatingPerformance Appraisal Programs:

Becoming a Cyber Professional: A Discussion with Recent Graduates

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Toward Curricular Guidance in the Cyber Sciences

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

David Richard Tannenbaum

Becoming a Cyber Professional: A Discussion with Recent Graduates

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Vishal V. Agrawal. McDonough School of Business, Georgetown University Assistant Professor, Operations and Information Management, 2010-present

Project Lead Location Amount Project Description. American Lung Association in Minnesota

The Role of NSF Advanced Technological Education Centers in National Cybersecurity Education Efforts

Trends in SwA Practice: Education and Adoption

Graduate Physics Degrees Largest Departments and Degree Distribution

Ozgur Aktunc, Ph.D. Engineering Department St. Mary s University San Antonio, TX

TO THE MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: DISCUSSION ITEM

EXAMINING COSTS AND TRENDS OF WORKERS COMPENSATION CLAIMS IN MASSACHUSETTS

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

CANAN ULU. Operations and Information Management Area, Washington, D.C

Transfer Workshop & Resources

University of Virginia, Darden School of Business, Charlottesville, Virginia Assistant Professor of Business Administration

CAMPEP and the Future of Education for Medical Physicists. Geoffrey D. Clarke, Ph.D. CAMPEP Board Member

Linda B. Roberts, MSN, RN Manager, Illinois Center for Nursing

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Shaping the Future of Cybersecurity Education

APGO/ORTHO-McNEIL UNDERGRADUATE MEDICAL EDUCATION RESEARCH AWARD. APGO Medical Education Foundation in Obstetrics and Gynecology

UC AND THE NATIONAL RESEARCH COUNCIL RATINGS OF GRADUATE PROGRAMS

Job Market Intelligence:

ASSESSING RISK OF SENIOR LIVING OVER-SUPPLY A LONG-TERM PERSPECTIVE

ECONOMICS GRADUATE PROGRAMS. Educating tomorrow s leaders and decision makers.

Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions

Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders

Q2 Which university will you be attending? American University (366) Arizona State University (367) Boston University (368) Brown University (439)

Xuanming Su. Education. Stanford University, Stanford, CA. (9/1997-6/2004)

ACTION. The Profession's Response to the Problem of Addictions and Psychiatric Disorders in Nursing

JOSEPH J. NACARIO, M.S.

70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?

Sponsored by National Science Foundation

Active Learning with the CyberCIEGE Video Game

Update on Psychology Education in VA

Diversifying the Teaching Force: Preparing Paraeducators as Teachers

At War with the Weather Managing Large-Scale Risks in a New Era of Catastrophes

Department of Political Science Phone: (805) University of California, Santa Barbara Fax: (805)

Master of Fine Arts in Creative Writing and Poetics University of Washington Bothell

Jacqueline Amber Scherer, M.A.

Colton B. Christian Department of Psychology 1227 University of Oregon Eugene, OR

October 2008 Research Brief: What does it take to prepare students academically for college?

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

Adap%ve Cybersecurity Technologies: Impact

IT and Outsourcing. Module 4. Cynthia L. Tomovic, Ph.D., Editor. Research Assistants

HOMELAND SECURITY INTERNET SOURCES

by Joshua H. Sternoff and Jocelyn M. Sturdivant Review of Investment Funds Necessary to Fulfill Fiduciary Obligations

GUIRR UPDATE. Susan Sloan, Director. FDP Meeting * May 11, 2015

2004 Salary Survey for User Experience Design and Usability Professionals

COMMITTEE ON EQUAL OPPORTUNITIES IN SCIENCE AND ENGINEERING (CEOSE) National Science Foundation MEETING MINUTES October 16, 2014

EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990

HACU National Internship Program

Stimulating Small Business Growth

UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS AUSTIN DIVISION

Kyndra V. Middleton, Ph.D th St. NW Washington, DC (202) kyndra.middleton@howard.edu

Marsha B. Keune June 2015

National Initiative for Cyber Security Education

Board on Research Data and Information: Activities for Better Management of Our Data Resources

Cybersecurity & the Water Sector

The Relationship Between Asset Management and Performance Management

NASA OFFICE OF INSPECTOR GENERAL

NASCIO 2014 State IT Recognition Awards

National policy encompasses both preserving

Which Describes Your Cybersecurity Program Eager Beaver or Deer in Headlights? October 29, 2015

Unpacking Career Readiness

COUNTY COLLEGE OF MORRIS WEEKEND NURSING PROGRAM. Summary of Need for the Weekend Nursing Program at CCM:

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

NGS/U Accelerated Doctoral Programs (DBA) DBA Quality Systems Management. DBA Homeland Security Policy & Defense (pending)

SANS Vendor Marketing Programs

64th Annual National Moot Court Competition Regional Sponsors List

CIPAC Water Sector Cybersecurity Strategy Workgroup: FINAL REPORT & RECOMMENDATIONS

National Bureau for Academic Accreditation And Education Quality Assurance LINGUISTICS # UNIVERSITY CITY STATE DEGREE MAJOR SPECIALTY RESTRICTION

Sarah E. Stein Virginia Polytechnic Institute and State University Pamplin College of Business 3102 Pamplin Hall Blacksburg, VA

COLLEGES Aberdeen, University of Alabama, University of Alaska, University of at Anchorage Arizona State University Arizona, University of Arkansas,

THE THREE ASPECTS OF SOFTWARE QUALITY: FUNCTIONAL, STRUCTURAL, AND PROCESS

Benefits of STEM OPT Program

Vita Larry A. Norsworthy, Ph.D. 20 Pinehurst Abilene TX

The Relationship Between Asset Management and Performance Management

THE COMMISSION ON QUALITY ASSURANCE FOR ALTERNATIVE PROVIDERS OF POSTSECONDARY EDUCATION

Coursework (%) Ross School of Business 7 Tilburg University, TiasNimbas Georgia Institute of Technology,

2013 INTERIM GRANT REVIEW Aging and Health Program

PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES

FINDINGS AND RECOMMENDATIONS OF THE SURVEY OF ENGINEERING ENTERPRISE LEADERS GROUP ENERGY EFFICIENCY AND GREENHOUSE GAS REDUCTIONS

03/13/2011 8:45 am 12:00 pm. Oral Presentations by MS PHD S Student Participants, NSF Room Wilson Boulevard, Arlington, Virginia 22230

Registered Dental Hygienists in Alternative Practice: Increasing Access to Dental Care in California Executive Summary

Mary Jo Stahlschmidt. Patricia L. Kohl [c] [e] Dissertation Chair.

Case 1:13-cv DJC Document 52 Filed 07/03/14 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MASSACHUSETTS

The American Physiological Society Meeting/Conference Proposal Application Instructions

Transcription:

1

Committee Task Committee Statement of Task (Key components) To consider the role that professionalization could play in enhancing the capacity and capability of the national cybersecurity workforce To identify criteria that could be used by decision-makers in government and the private sector when considering measures to professionalize the cybersecurity workforce. Broader DHS Context (from NICCS portal) Is cybersecurity ready to be professionalized across the nation? Which jobs within the cybersecurity field should be professionalized and to what degree? Should the federal government lead this effort single handedly? Sponsored by Department of Homeland Security, National Initiative for Cybersecurity Education 2

3

Report Reviewers Byron Collie, Goldman Sachs Group, Inc. Stephen Cooper, Stanford University Paul E. Gray, Massachusetts Institute of Technology Cynthia Irvine, Naval Postgraduate School John D. Johnson, Deere & Company Susan Landau, privacyink.org Fred Oswald, Rice University Michael Papay, Northrup Grumman Corporation Franklin S. Reeder, Reeder Group, Inc. Eugene Spafford, Purdue University Anita Jones, University of Virginia 4

Report Input 3 National Public Workshops (Washington, DC; San Francisco, CA; San Antonio, TX) Additional efforts (NSF CyberCorps PI meeting, others) Participants Educational institutions and professional development organizations, professional associations Employers: federal, state, and local government, private sector firms Cybersecurity workers Students 5

Conclusions 6

Capacity and Capability Conclusion 1 More attention to both the capacity and capability of the U.S. cybersecurity workforce is needed. Conclusion 2 Although the need for cybersecurity workers is likely to continue to be high, it is difficult to forecast with certainty the number of workers required or the needed mix of cybersecurity knowledge and skills. 7

Cybersecurity Work and Workforce Conclusion 3 Cybersecurity is a field that encompasses more than one kind of work and more than one occupation or profession. Whether and how to professionalize will vary according to role and context. Conclusion 4 Because cybersecurity is not solely a technical endeavor, a wide range of backgrounds and skills will be needed in an effective national cybersecurity workforce. 8

Professionalization Conclusion 5 Professionalization has multiple goals and can occur through multiple mechanisms. Conclusion 6 The path toward professionalization of a field can be slow and difficult, and not all portions of a field can or should be professionalized at the same time. Conclusion 7 Professionalization has associated costs and benefits that should be weighed when making decisions to undertake professionalization activities. 9

Criteria and Recommendation 10

Recommendation Activities by the federal government and other entities to professionalize a cybersecurity occupation should be undertaken only when the: Occupation has well-defined and stable characteristics; Observed deficiencies in the occupational workforce could be remedied through professionalization; and Benefits outweigh the costs. 11

Criteria for Decision-Making Do the benefits of a given professionalization measure outweigh the potential supply restrictions resulting from the additional barriers to entry? Does the potential to provide additional information about a candidate outweigh the risks of false certainty about who is actually best suited for a job? Do the benefits of establishing the standards needed for professionalization outweigh the risks of Obsolescence (when the knowledge or skills associated with the standard are out-of-date by the time a standard is agreed on) and Ossification (when the establishment of a standard inhibits further development by workers of their skills and knowledge)? 12

Applying the Criteria Criteria for identifying where professionalization may be appropriate Identify trade-offs that should be considered by those seeking to professionalize (including the U.S. government, other U.S. public and private employers, educational institutions, certification bodies, ) Illustrate the complex set of costs and benefits associated with professionalization Uncertainties may diminish over time, and long-term benefits may ultimately outweigh short-term costs Criteria for undertaking professionalization activities Can be used by decision makers to judge when parts of the cybersecurity field have reached the time where professionalization is warranted 13

Report available http://www.cstb.org Question, Comments Diana L. Burley, Ph.D. Co-Chair dburley@gwu.edu 14