Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid



Similar documents
Jim Nichols Instructional Computing Division Chair Estrella Mountain Community College

Goal. Vision. CAE 2Y Program Eligibility and Summary

Sabbatical Leave Application

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Brandman University. School of CCNA

CyberSkills Management Support Initiative

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

DHS. CMSI Webinar Series

Information Technology Cluster

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Cyber Security at NSU

Access FedVTE online at: fedvte.usalearning.gov

Information Systems Technology & Cybersecurity Programs

Report on CAP Cybersecurity November 5, 2015

Cybersecurity Workforce Training Partnership

Network Engineering Technology

Request to Accept Trade Adjustment Assistance Community College and Career Training Grant

Information Security Principles and Practices

Hosted by Lunarline: School of Cyber Security

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Cybersecurity Education Doesn t Always Take Place in the Classroom

Becoming a Cyber Professional: A Discussion with Recent Graduates

Connecting PTE to Careers in Idaho

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Minnesota State Community and Technical College Detroit Lakes Campus

Security Transcends Technology

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Technology Approved Certifications

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

CAE Program Updates and Support

Department of Homeland Security Federal Government Offerings, Products, and Services

Goal. Vision. CAE IA/CD Program Eligibility and Summary

Introduction to Cyber Security / Information Security

Field of Study Area of Expertise Certification Vendor Course

Cybersecurity High School and Beyond

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Certification and Training

National Initiative for Cybersecurity Education

IT and Cybersecurity. Workforce Development with CompTIA Certification

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Principles of Information Assurance Syllabus

Table of Contents. Introduction. Audience. At Course Completion

Cyber R &D Research Roundtable

UNM Information Assurance Scholarship for Service (SFS) Program

COMPUTER AND INTERNETWORKING TECHNOLOGIES

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

Get Into Energy Outreach and Career Coaching Purpose: Targeted Career Awareness Campaigns: Career and Education Advising and Guidance:

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

The Premier IA & Cyber Security Training Specialist

Northern Virginia Workforce Area # Credential Attainment Summary and Projections

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

How To Become A Cybersecurity Consultant

Cyber Defense Operations Graduate Certificate

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

Information Technology 2015 Programmes

Actions and Recommendations (A/R) Summary

National Initiative for Cybersecurity Education

Middle Class Economics: Cybersecurity Updated August 7, 2015

College of Information Technology

Program Drill-Downs National

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Information & Telecommunication Technology

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

[STAFF WORKING DRAFT]

CPRO Security Networking Certification Matrix

Bellevue University Cybersecurity Programs & Courses

Bridging the gap between tomorrow s IT job skills and today s workforce

2014 CYBER INDUSTRY SURVEY

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

Cybersecurity AAS Program

Transcription:

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Which is it? Cyber Security ~or~ Cybersecurity?

Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr. Clay Goodman VP Occupational Education Estrella Mountain Community College Consortium Director Arizona Sun Corridor-Get Into Energy Consortium

Estrella Mountain Community College A Maricopa Community College 2014 Aspen Award Winner Only Arizona College to be named all three rounds Enrollment Demographics Lead College TAACCCT Round 2 Grant

Arizona Sun Corridor -Get Into Energy Consortium

Transformative Change Initiative The Transformative Change Initiative (TCI) capitalizes on the window of opportunity created by the Department of Labor s Trade Adjustment Assistance Community College and Career Training (TAACCCT) program.

Innovations Supply & Demand Model Working closely with industry to identify employee needs Colleges understand capacity and ensure adequate supply of qualified candidates Competency Model Expand across multiple industries Common, stackable credentials

Competency Models

Power Systems and IT Security AAS Track Credits Certifications Program Pre-Reqs & Gen Ed 25 Security Core 22 Network+; Linux+; Windows 7; MCTS; Configuration; Security+; GSEC; CNSS 3011; SSCP (test) Power Systems IT Security Track 18 NCRC/NCRC+; Employability Skills; Energy Industry Fundamentals; Certified SCADA Security Architect (CSSA) Network Security 20 CCENT; CCNA-Routing and Switching; CCNA-Security; CCNA- Wireless Systems Security-Linux Track Systems Security- Microsoft Track 18 RHCSA; RHCE; CEH 18 MCTS: Windows Server 2012; Network Infrastructure, Configuration; MCTS: Windows Server 2008 Active Directory, Configuration; MCSA: Windows Server 2008; CEH; MCSA-Server Admin

Advisory Council FBI Cyber Operations Unit (PHX Field Office) Association for Computing Machinary Arizona Counter Terrorism Intelligence Center Arizona Public Service Palo Verde Nuclear Generating Station Arizona Department of Homeland Security Arizona Cyber Threat Response Alliance Arizona InfraGard American Express

Partners CyberWatch West The Center for Cybersecurity Education National Cybersecurity Institute Excelsior College InfraGard Partnership between the FBI & the private sector including academic institutions

Cyber Security Competencies Competency Level Career Readiness Content Basic Employability Skills STEM Industry Certification National Career Readiness Certificate; National Career Readiness Certificate Plus Employability Skills Education Level (example) High School/College Professional Experience Required Career Preparation

Cyber Security Competencies Competency Level Technician Content Information security principles Access control Risk Management Information Technology principles Information security compliance Threats, attacks and vulnerabilities Security tools and techniques Encryption and cryptography Security operations, and activities Audit, testing and monitoring strategies Malicious code activity Information technology protection mechanisms Information technology Ethics Operating System Security Network Security Industry Certification CompTIA Security Plus CNSS 4011 GIAC GSEC ISC2 SSCP (Test) Education Level Associate Degree Professional Experience Required Entry Level

Cyber Security Competencies Competency Level Practitioner Content Access Controls Cryptography Malicious Code and Activity Monitoring and Analysis Networks and Communications Risk, Response and Recovery Security Operations and Administration Risk Management Framework (RMF) Categorization of Information Systems Selection of Security Controls Security Control Implementation Security Control Assessment Information System Authorization Monitoring of Security Controls Industry Certification Certified Authorization Professional (CAP) Systems Security Certified Practitioner(SSCP) Education Level (example) Bachelors Degree Professional Experience Required 1-5 years

Cyber Security Competencies Competency Level Expert/Senior Practitioner Content Access Control Telecommunications and Network Security Information Security Governance and Risk Management Software Development Security Cryptography Security Architecture and Design Operations Security Business Continuity and Disaster Recovery Planning Legal, Regulations, Investigations and Compliance Physical (Environmental) Security Research & Analysis Integration of Computing, Communications, and Business Disciplines Industry Certification Certified Information Systems Security Professional (CISSP) CompTIA Advanced Security Practitioner (CASP) Education Level (example) Masters Degree Professional Experience Required 5-10 yrs

Homeland Security Academic Advisory Council s (HSAAC) Subcommittee on Cybersecurity 1. How to attract students, student veterans and recent graduates to cybersecurity jobs at DHS; 2. How can DHS better promote the DHS/National Security Agency National Centers of Academic Excellence cybersecurity programs tothe higher education community; 3. How to define the core elements of cybersecurity degree and certificate programs to prepare graduates for mission-critical cyber jobs at DHS; 4. How DHS can facilitate and strengthen strategic partnerships with industry, national labs, colleges, universities and others to build the cybersecurity workforce; 5. How DHS can partner with academia to build a pipeline of diverse students in STEM; and 6. How key subcategories in cybersecurity such as policy, critical infrastructure, human factors intellectual property, and others can inform academic pathways to meet national needs.

HSAAC Recommendations DHS should launch an internal campaign to educate program managers on the new Pathways Programs hiring authority for internships, including the options it presents for providing community college students with work experience. The summer 2013 Secretary s Honors Program Cyber Student Volunteer Initiative, in which community college students served in U.S. Immigration and Customs Enforcement cyber forensics labs, should be expanded and cited as a best practice. DHS should ensure that its cyber internship programs include a structured career path where participants have the opportunity to be hired for permanent entry-level positions upon completion of the program.

HSAAC Recommendations DHS should expand its internship opportunities to include virtual internships and mentorships, in order to engage additional students and strengthen the Department s cybersecurity recruitment efforts. DHS and NSA should align the KUs used as criteria for CAE designations to a set of learning outcomes to help institutions of higher education developing cyber-related degree and certificate programs better meet workforce needs. DHS and NSA should formally deputize CAEs to act as representatives of the program at higher education conferences and meetings to conduct outreach and promote the program s benefits to academic institutions.

NSA Center of Academic Excellence 2Y 1. Outreach and Collaboration 2. Center for Information Assurance (IA) and Cyber Defense (CD) Education 3. IA/CD Student Development 4. IA/CD as a Multidisciplinary Science 5. Practice of IA/Cybersecurity Encouraged Throughout the Institution 6. IA/CD Faculty

Questions? Ernie Lara (ernie.lara@estrellamountain.edu) Clay Goodman (clay.goodman@estrellamountain.edu) Arizona Sun Corridor-Get Into Energy Consortium (az.getintoenergy.com) Estrella Mountain Community College (www.estrellamountain.edu)