National Initiative for Cyber Security Education



Similar documents
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

NICE and Framework Overview

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education

Shaping the Future of Cybersecurity Education

Introduction to NICE Cybersecurity Workforce Framework

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Strategic Plan September 2012

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

DEPARTMENT OF COMMERCE OFFICE OF HUMAN RESOURCES MANAGEMENT HUMAN RESOURCES (HR) BULLETIN #201, FY15

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

NICE Cybersecurity Workforce Framework Tutorial

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

The Comprehensive National Cybersecurity Initiative

An Overview of Large US Military Cybersecurity Organizations

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

September 24, Mr. Hogan and Ms. Newton:

Preventing and Defending Against Cyber Attacks June 2011

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

Middle Class Economics: Cybersecurity Updated August 7, 2015

DHS. CMSI Webinar Series

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Preventing and Defending Against Cyber Attacks November 2010

Operationally Focused CYBER Training Framework

[STAFF WORKING DRAFT]

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

National Cyber Security Policy -2013

Cybersecurity in the States 2012: Priorities, Issues and Trends

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

2 Gabi Siboni, 1 Senior Research Fellow and Director,

FFIEC Cybersecurity Assessment Tool

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

How To Write A National Cybersecurity Act

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Cyber Education triangle clarifying the fog of cyber security through targeted training

Department of Homeland Security

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Department of Homeland Security Federal Government Offerings, Products, and Services

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

Small Business. Leveraging SBA IT resources to support America s small businesses

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

U.S. Cyber Security Readiness

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Enterprise Security Tactical Plan

Air Force Association s CyberPatriot The National High School Cyber Defense Competition

Priority III: A National Cyberspace Security Awareness and Training Program

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C October 30, 2015

Department of Defense DIRECTIVE

UNM Information Assurance Scholarship for Service (SFS) Program

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Introducing... FedVTE and FedCTE

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Cyber Workforce Training

Actions and Recommendations (A/R) Summary

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity: Mission integration to protect your assets

State of South Carolina Initial Security Assessment

Thomas J. Schlagel Chief Information Officer, BNL

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

TUSKEGEE CYBER SECURITY PATH FORWARD

CHIEF INFORMATION OFFICERS COUNCIL

Strategic Progress Update July 2014 March 2015

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Roadmap for new Cyber security education in ME

Toward Curricular Guidance in the Cyber Sciences

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

S. ll IN THE SENATE OF THE UNITED STATES

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Water Sector Approach to Cybersecurity Risk Management

CYBER SECURITY GUIDANCE

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

Panel Session: Lessons Learned in Smart Grid Cybersecurity

A Role-Based Model for Federal Information Technology/ Cybersecurity Training

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Publication Number: Third Draft Special Publication Revision 1. A Role Based Model for Federal Information Technology / Cyber Security Training

Agency for State Technology

Transcription:

2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014

NICE OVERVIEW Women s Business and Smart Technology 23 May 2014 0

Background 2008 - Comprehensive National Cybersecurity Initiative #8 we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees. 2009-60-Day Cyber Review Promote cybersecurity risk awareness for all citizens; Build an education system that will enhance understanding of cybersecurity and allow the United States to retain and expand upon its scientific, engineering, and market leadership in information technology; Expand and train the workforce to protect the Nation s competitive advantage; 1

National Initiative for Cybersecurity Education March 2010: NICE formed a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital workforce for the 21st century. President Barack Obama 29 May 2009 2

A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many cybersecurity training programs exist but lack consistency among programs. Potential employees lack information about skills and abilities for cybersecurity jobs. Resources exist for teachers and students about cybersecurity but are difficult to find. Cybersecurity career development and scholarships are available but uncoordinated. Lack of communication between government, private industry, and academia. The National Initiative for Cybersecurity Education (NICE) was established to raise national cybersecurity awareness, broaden the pool of cybersecurity workers through strong education programs, and build a globally competitive cybersecurity workforce. National Initiative for Cybersecurity Careers and Studies (NICCS) 3

U.S. IT WORKFORCE STATISTICS According to the U.S. Bureau of Labor Statistics, there are approximately 4.0 million people employed in the U.S. IT labor workforce. Percentage of IT Workers by Sector Percentage of IT Workers by Technology Domain 5% 3% 4% 5% 100% 90% 80% 20% Application Application Support 82% 70% 17% Data Center 60% End-User Computing 16% 50% IT Service Desk 40% 12% IT Management 30% 9% PRIVATE SECTOR SELF-EMPLOYED FEDERAL GOV'T 20% 10% 0% 8% 8% 5% 5% Data Network Finance and Administration Voice Network *Source: CompTIA Colloquium 2012 - U.S. IT Market Supply and Demand Briefing 4

Proposed Mission, Goals Mission Statement NICE will enhance the overall cybersecurity posture of the United States. Goals Raise national awareness about risks in cyberspace Broaden the pool of individuals prepared to enter the cybersecurity workforce Cultivate a globally competitive cybersecurity workforce 5

Internal Component Structure NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION NIST C1 C2 C 3 C4 DHS DoED NSF DHS DHS ODNI DOD 6

A SOLUTION NICE developed the National Cybersecurity Workforce Framework (the Framework) to codify cybersecurity work and to identify the specialty areas of cybersecurity professionals. The Framework establishes: A common taxonomy and lexicon for cybersecurity workers that organizes cybersecurity into 31 specialty areas within 7 categories. A baseline of tasks, specialty areas, and knowledge, skills and abilities (KSAs) associated with cybersecurity professionals. The Framework assists with strategic human capital efforts, including: Workforce planning Recruitment and Selection Training and Succession Planning 7

National Cybersecurity Workforce Framework Securely Provision Operate and Maintain Protect and Defend Investigate Operate and Collect Analyze Oversight and Specialty areas responsible for conceptualizing, designing, and building secure information technology (IT) systems, i.e., responsible for some aspect of systems development. Specialty areas responsible for providing support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. Specialty area responsible for identification, analysis and mitigation of threats to internal information technology (IT) systems and networks. Specialty areas responsible for investigation of cyber events and/or crimes of information technology (IT) systems, networks, and digital evidence. Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Specialty area responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Specialty areas that providing leadership, management, direction, and/or development and advocacy so that individuals and organizations may effectively conduct cybersecurity work. 8

National Cybersecurity Workforce Framework Categories Securely Provision Operate and Maintain Protect and Defend NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK v1.0* Specialty Areas Information Assurance (IA) Compliance Data Administration Computer Network Defense (CND) Analysis Software Assurance and Security Engineering Knowledge Management Incident Response Investigate Digital Forensics Investigation Collect and Operate Analyze Oversight and Collection Operations Threat Analysis Legal Advice and Advocacy Cyber Operations Planning Exploitation Analysis Strategic Planning and Policy Systems Security Architecture Customer Service and Technical Support Computer Network Defense (CND) Infrastructure Support Cyber Operations All Source Intelligence Education and Training Technology Research and Network Services Vulnerability Assessment and Management Targets Information Systems Security Operations (Information Systems Security Officer [ISSO]) Systems Requirements Planning System Administration Security Program Management (Chief Information Security Officer [CISO]) Test and Evaluation Systems Security Analysis Systems *The Framework consists of thirty-one specialty areas organized into seven categories. These categories, serving as an overarching structure for the Framework, group related specialty areas together. In essence, specialty areas in a given category are typically more similar to one another than to specialty areas in other categories. Within each specialty area, typical tasks and knowledges, skills, and abilities (KSAs) are provided. The entire Framework is available at http://csrc.nist.gov/nice/framework/. 9

Framework 2.0 Categories and Specialty Areas Recommended Changes Key Updated Specialty Area Title and Definition (8) Updated Specialty Area Definition (14) New Specialty Area (1) Change in Category Placement (2) Protect and Defend Enterprise Network Defense Analysis Operate and Maintain System Administration Network Services Oversee and Govern* Strategic Planning and Policy Security Program Management Information Systems Security Operations Training, Education, and Awareness (TEA) Securely Provision Technology Research and Systems Requirements Planning Systems Security Architecture DRAFT Secure Software Engineering CATEGORIES NOT UPDATED (DUE TO SENSITIVE CONTENT) Collect and Operate Cyber Operations Planning Cyber Operations Collection Operations Investigate Digital Forensics Vulnerability Assessment and Management Incident Response Customer Service and Technical Support Systems Security Analysis Legal Advice and Advocacy Knowledge Management Systems Test and Evaluation Analyze Cyber Threat Analysis All Source Intelligence Targets Cyber Investigation Enterprise Network Defense Infrastructure Support Data Administration Risk Management (was IA Compliance) Secure Acquisition Exploitation Analysis * The Oversight and Category name changes to Oversee & Govern. 10

*Dates are subject to change based on availability of funding and resources. HOW THE FRAMEWORK IMPACTS ALL FOUNDATIONAL ACTIVITIES Framework: A common language to define cybersecurity work. The Framework defines specialty areas, KSAs, and competencies. Key Activities*: Version 1.0 Released (Aug 2012), LRM Process (Dec 2012 Mar 2013), OPM Data Element Guidance (Oct 2012), Framework How-To Implementation Guide (Dec 2012), Framework Roll-out (Ongoing) Training Catalog / NICCS: An online web resource with a robust collection of trainings mapped to the Framework. Key Activities*: Launch of the NICCS Portal (Dec 2012), Launch of the Training Catalog (Mar 2013) IT Workforce Assessment: Collect data to identify the current state of the information technology workforce, and to assess current cybersecurity capabilities. Key Activities*: Federal Pilot & (Oct 2012), Submit Federal Findings Report (Mar 2013) Training Gap Analysis: Ensure that available training is appropriate in terms of quality, need, and content. Key Activities*: Workforce Current Training Needs Report (Mar 2013), Training Gap Analysis Report (Jun 2013) Professional Roadmaps: Develop resources which depict progression from entry to expert within each specialty area. Key Activities*: Develop and Publish Professional Roadmaps within NICCS (2013) NICE National Cybersecurity Awareness Formal Cybersecurity Education Cybersecurity Workforce Structure Cybersecurity Professional

THE NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES (NICCS) PORTAL Serves as the Nation s online resource for cybersecurity awareness, education, careers, training, and professional development. Builds an online portal for cybersecurity professionals and interested parties to gain knowledge related to their field. Raises cybersecurity awareness and will affect a change in the American public to adopt a culture of cyberspace security. Provides up-to-date material related to cybersecurity awareness, education, careers, and training programs. www.niccs.us-cert.gov 12

NEXT STEPS Your assistance is critical to defining and creating a high-performing cybersecurity workforce. Next steps include: Exploring the NICCS website and learning how your organization can become involved. Becoming familiar with the Framework and its significance in human capital planning. Identifying points of contact (POCs) and champions in your organization to identify how to best adopt the Framework. Using the following How-To Guide to decide how to tailor the Framework to your your organization s workforce needs. Establishing an internal plan for adopting the Framework. Communicating the Framework with your network of colleagues. Linking implementation of the Framework to the Closing the Skills Gap effort. Developing Framework Version 2.0 began on June 21 st, 2013, continues draft due due summer of 2014. NICE 2.0 on the way, transition to be completed by end of FY14. 13

Steady-State Milestones Raised awareness about the risks of online activities Effective communication resources Annual NICE Workshop Activities focused on closing identified cybersecurity education, training, and awareness gaps Established metrics to measure progress 14

Contact Information Ernest McDuffie PhD ernest.mcduffie@nist.gov NICE Staff nice.nist@nist.gov Website http://nist.gov/nice 15

WHITE HOUSE DEFINITION OF CYBERSECURITY Cybersecurity professionals are involved in activities that include strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. 2009 -Cyberspace Policy Review, May 16

FRAMEWORK CATEGORIES AND SPECIALTYAREAS The Framework organizes cybersecurity work into 31 specialty areas within 7 categories. Each specialty area represents an area of concentrated work, or function, within cybersecurity. Below are the 7 categories (bold), with corresponding specialty areas. Securely Provision Systems Requirements Planning Systems Software Assurance and Security Engineering Systems Security Architecture Test and Evaluation Technology Research and Information Assurance (IA) Compliance Operate and Maintain System Administration Network Services Systems Security Analysis Customer Service and Technical Support Data Administration Knowledge Management Collect and Operate Collection Operations Cyber Operations Planning Cyber Operations Protect and Defend Vulnerability Assessment and Management Incident Response Computer Network Defense (CND) Analysis Computer Network Defense (CND) Infrastructure Support Investigate Investigation Digital Forensics Analyze Cyber Threat Analysis Exploitation Analysis Targets All Source Intelligence Oversight and Legal Advice and Advocacy Education and Training Strategic Planning and Policy Information Systems Security Operations (ISSO) Security Program Management (Chief Information Security Officer [CISO]) 17