Cyber Workforce Training



Similar documents
Space Ground Services in the Joint Information Environment (JIE)

Operationally Focused CYBER Training Framework

Infrastructure Development Forecast to Industry

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Introducing... FedVTE and FedCTE

National Initiative for Cyber Security Education

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

DoD IA Training Products, Tools Integration, and Operationalization

Cyber Situational Awareness - Big Data Solution

Building Security In:

DON Cybersecurity/Information Assurance Workforce Management

Introduction to NICE Cybersecurity Workforce Framework

Department of Defense DIRECTIVE

DISA Acquisition Opportunities

Partnering with Small Business

DISA and the Evolving DoD Enterprise

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Hosted by Lunarline: School of Cyber Security

Department of Defense INSTRUCTION

CyberNEXS Global Services

Joint Information Environment Single Security Architecture (JIE SSA)

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD Strategy for Defending Networks, Systems, and Data

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

An Overview of Large US Military Cybersecurity Organizations

NICE Cybersecurity Workforce Framework Tutorial

Cybersecurity Throughout DoD Acquisition

Fort Gordon Mobile Training Team (MTT) Requirements (FY16)

The HIPAA Security Rule: Theory and Practice

DoD Cybersecurity Discipline Implementation Plan October 2015 Amended February 2016

Network Operations (NetOps)

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

INFORMATION SECURITY STRATEGIC PLAN

A Comprehensive Cyber Compliance Model for Tactical Systems

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

NICE and Framework Overview

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

DOD Information Assurance Training & Awareness Products To order our products, please go to the following website:

Department of Defense INSTRUCTION

Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

CForum: A Community Driven Solution to Cybersecurity Challenges

State of Cyber Workforce Development

How To Improve Federal Network Security

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Department of Defense DIRECTIVE

DoD IT Service Management Initiatives Implications and Opportunities for Industry

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

September 24, Mr. Hogan and Ms. Newton:

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville

Mark S. Orndorff Director, Mission Assurance and NetOps

National Initiative for Cybersecurity Education

US Army Network Security Reference Architecture

FOREWORD. MICHAEL J. BASLA, Lt Gen, USAF Chief, Office of Information Dominance and Chief Information Officer

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

DoD Software Assurance (SwA) Overview

CSR REPORT 2016 Corporate Social Responsibility Report

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Core Data Center Reference Architecture

Why you should adopt the NIST Cybersecurity Framework

How To Develop A Data Center Cost Model

How To Evaluate A Dod Cyber Red Team

How To Write A Cybersecurity Framework

The Premier IA & Cyber Security Training Specialist

National Initiative for Cybersecurity Education

Army Cloud Computing Strategy

Review of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region

Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, Washington, DC

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Enterprise Security Tactical Plan

The Department of Defense Strategy for Implementing the Joint Information Environment

1. Contracting Officer Representative (COR)

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

The fast track to top skills and top jobs in cyber. Guaranteed.

Preventing and Defending Against Cyber Attacks November 2010

Utica College. Information Security Plan

IT Service Management in the JIE and the DoD Enterprise Service Management Framework

Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches Briefing name l Date (1)

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES

Cybersecurity: The Defense Perspective

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Information Security Risk and Compliance Series Risking Your Business

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

DOD Medical Device Cybersecurity Considerations

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1.

DON CIO Cyber/IT Workforce Management and Competencies

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Transcription:

Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1

DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA in accordance with the DoD Cyber Workforce Framework, to allow for prioritization of efforts towards Role based training, assessments, tracking, management and reporting of the CWF in a standardized way across DISA & DoD. JIE Role-Based Training Will increase knowledge, skills and abilities of the DISA and DoD Cybersecurity workforce and improve the DoDIN and Defensive Cyber Operational status. Cyber Protection Team Training DoD Information Network training program consisting of classroom instruction and lab exercises. Targeted security training Cybersecurity Workforce Assessment & Certification Level 1 (11 Roles) To establish an Assessment and Certification Methodology to Professionalize the DISA Cyber Workforce. JIE/JRSS Cyber Security Range Virtual Training Environment (VTE) To provide a VTE integrated into the CSR, scalable in capability and capacity, ISO anticipated growing demand in DISA/DoD training support requirements. Risk Management Framework Provide updated training processes and responsibilities as DoD transitions from DIACAP to RMF 2

JIE Training Situation Analysis Problem Statement: Existing DISA/DoD Cyberspace Workforce (CWF) training and certification programs do not currently provide a framework that effectively integrates JIE/JRSS training and assessment. Requirement: To develop and establish a CWF training framework (JIE/JRSS training environment) NLT (TBD) that provides the capability and capacity to effectively train and certify the JIE/JRSS roles. Background: Standardized JIE Enterprise Operations Center role-based training Army/Air Force/DISA are collaborating in the development of Joint Regional Security Stack (JRSS) training Framework development plan is a multi-phased & parallel effort Phase 1: Initial tools training at the different Tiers Phase 2: Develop JIE/JRSS Role-based training content Phase 3: Building a JIE/JRSS Cyber Security Range virtual training environment Phase 4: Provide Role-based individual/team assessments Outcome: Standard for all JIE centric operations 3

Joint Table Top Exercises/Workshops Objective Operational Vetting of Vignettes & support requirements Vetted operational vignettes Identified Echelons of Authority Construct (Draft) Identification of Cyberspace Roles Established core TTP frameworks Validated JIE infrastructure Identified training requirements Developed training gap analysis plan Draft training plan & timelines Operational Timeline 4

JIE Role-Based Training Training Development Process Identify tools and capabilities JIE Indentify roles and responsibilities Determine interaction between tools capabilities & processes Identify baseline training and determine training gaps Identify SMEs for OJT Content development by role for tools, capabilities and processes Training Delivery Quality control & user feedback 5

Future CSR Operational Architecture 6

Capstone DoD Cyber Range Assessments DoD Cyber Security Range-based and instructor facilitated webdelivered training and/or assessment for Cyber JIE operators using a common Joint Information Enterprise: Tactics Techniques & Procedures; NETOPS & CND tools and services Increases a JIE operator s proficiency level and demonstrated ability to apply to real-world threats in a non-production environment Qualifies the JIE workforce for collective Enterprise Operation Center and Joint Regional Security stack like missions Provides standardized JIE assessments metrics that measure readiness across the workforce 7

8 Cybersecurity Training Products Branch POC: DISA/PEO-MA EMAIL: disa.letterkenny.fso.list.training-team-members@mail.mil PHONE: 717-267-5481