SlideShare ist ein Scribd-Unternehmen logo
1 von 23
THE BIGGEST THREAT TO THE U.S. DIGITAL
 INFRASTRUCTURE: THE CYBER SECURITY
             WORKFORCE SUPPLY CHAIN

           Aleta Wilson, Ph.D.
            Amjad Ali, Ph.D.




                                     1
Overview
• Study examines supply and demand for
  cybersecurity professionals
• Progress impeded by lack of career field for
  cybersecurity professionals

 The Obama administration has declared that
  Protection of our digital infrastructure is a
            national security priority
                                                  2
Scope
• This study explores activities required to employ
  cyber security workers for the
   – federal government and
   – its contractor community
• These two sectors comprise an estimated 500,000
  workers
   – who must undergo a significant background
     check because
   – positions are considered as "national security
     positions".

                                                      3
Scope and Methodology (cont)
• Second focus of study is university level
   education and certifications
                   --------
                 Methodology
  View the cyber workforce through the prism
                of a supply chain
 In other words.... How to optimize the supply
           chain to increase production
                                             4
Definition of a Cyber Security
                  Professional




                             5
Definition of a Cyber Security
                     Professional - DOL

• DOL Occupational Outlook Handbook does not
  contain a definition for cybersecurity professionals
• DOL categories acknowledge positions that involve
  people who
   – plan, coordinate, and maintain an organization's
     information security
   – database administrators plan and coordinate security
     measures with network administrators
   – network engineers "may ... address information security
     issues”

                                                           6
Definition of a Cyber Security
                    Professional - DHS

• Department of Homeland Security
  Secretary Janet Napolitano defines
  Cybersecurity professionals as
  – employees responsible for "... cyber risk and
    strategic analysis; cyber incident response;
    vulnerability detection and assessment;
    intelligence and investigation; and network and
    systems engineering“

                                                      7
Definition of a Cyber Security
                Professional – ISC2

– Frost & Sullivan conducted a survey of 10,413
  information security professionals which
  indirectly defined security professionals as
  those
   • employed as Information Security
     professionals and
   • those who had cyber security as their
     primary job function.

                                                  8
Definition of a Cyber Security
                   Professional – DOD

DOD usually takes the lead in defining
 elements related to cyberspace and
 cybersecurity, but according to GAO

  "DOD has defined some key cyber-related terms
    but it has not yet fully identified the specific
    types of operations and program elements that
    are associated with full-spectrum cyberspace
    operations"

                                                       9
Definition of a Cyber Security
           Professional – Monster.com

• What does the largest job site call them
  –   Network engineers            But where
                                  are the web
  –   System Administrators        designers;
  –   IT Security Engineers       policy folk;
                                      SW
  –   IT Security Analysts         engineers;
                                      etc.
  –   Network Administrators           etc.




                                                 10
Definition of a Cyber Security
          Professional – for this study

• Professionals who have information
  security as a major part of their job;
• those who self-identify as cyber or security
  specialists; and,
• those who build and maintain the national
  critical infrastructure of the computer
  systems on which the public and private
  sectors have come to rely.

                                                 11
Now that we’ve defined them….


 How do they get to the workplace….




                                      12
Supply Chain Management (SCM)

• Viewing the shortage of cybersecurity
  workers through SCM
  – SCM attacks problem of uncertainty
      head-on
• SCM solves two core resource problems
   – Shortages and excesses
   – Identifies where the chain is broken
                                            13
Supply Chain Management (SCM)
                            • STEM


                              • Science                Engineering
Shortage      K to 12         • Technology             Math


                            • Higher Education
                              • Centers of Excellence
Dilution
                              • Other Higher Ed Institutions
            Higher Ed



                            • Non- Higher Education Certifiers
                              •   Certifying CISSP (ISC2)
 Need                         •   GSEC
           Professional       •   CompTIA Security+ Certification
           Certifications
                              •   Vendor certifications



                                                                     14
S.T.E.M. (K to 12)

• Public private partnership will invest
  $260M between 2009 and 2019 (like
  race to space)
• Growth in STEM jobs is 3X non-
  STEM jobs


                                           15
University Level Education

• NSA is Certifying Universities, Colleges,
  and now Community Colleges
• 124 NCA’s (as of 2010)
  – 14 are 2-year institutions
  – 2 are 4-year institutions
  – 51 are research institutions
  – Some fall into more than one category
                                              16
Certifications

• Certifications can come from

  • Universities $$$$ /
    • Value is unkown

  • Private sector $$ /
    • Highly prized
                          Highly recognized certificates

                                                           17
Certifications – Highly Recognized
                      ORGANIZATIONS AND THEIR CERTIFICATE OFFERINGS
      CERTIFYING                                        CERTIFICATION
     ORGANIZATION
      CERT                  CSIH
      CompTIA               Security+
      Cisco Systems         CCNA Security; CCSP; CCIE Security
      EC-Council            ENSA; CEH; CHFI; ECSA; LPT; CNDA; ECIH; ECSS; ECVP; EDRP;
                            ECSP; ESCO
      GIAC                  GSIF; GSEC; GCFW; GCIA; GCIH; GCUX; GCWN; GCED; GPEN;
                            GWAPT; GAWN; GISP; GLSC; GCPM; GLEG; G7799; GSSP-NET;
                            GSSP-JAVA; GCFE; GCFA; GREM; GSE
      ISAC                  CISA; CISM; CGEIT; CRISC
      (ISC)2                SSCP; CAP; CSSLP; CISSP; ISSAP; ISSEP; ISSMP
      ISECOM                OPST; OPSA; OPSE; OWSE; CTA
      Microsoft             MCSE, MCSA



                   Indication individual is improving herself.


                                                                                        18
What’s the Problem
• STEM will not produce for 10 years and then those high
  schooler’s have to go to college


• University pipeline is waiting for STEM graduates to enter


• Universities are not graduating enough cyber specialists

• University certificates are new and general
    • too soon to determine value



                                                               19
So What

• US has discovered it is behind the curve in the
  production of S.T.E.M graduates
• S.T.E.M skills are needed for cybersecurity
  workforce
• War has expanded beyond nation states to
  organizations like Wikileaks
• Warfare is expanding into cyberspace and we
  do not have war fighters
                                               20
So What (cont)

• Focusing on S.T.E.M in K-12 is critical to US
  economy
• The field of cybersecurity is being developed
  in pieces
  • NIST, Microsoft, Cisco, & NSA are each
     • Designing standards models, processes, certifications,
       and methodologies for the field and many of them
       overlap


                                                            21
Conclusion

• The US government must take immediate steps to
  coordinate the development of the cybersecurity field
• The US should task the National Security Agency to take
  the lead
• Once the field is defined
   – There will be sub-specialties
   – There will be a roadmap for obtaining proficiency (like doctors &
     lawyers)
   – There will be standardized tests
   – Estimates on workforce needs can more accurately be determined
   – Training and certifications can be organized and synchronized

                                                                         22
Questions and Answers




NSA designated National Center of Academic
Excellence in Information Assurance Education




                                                23

Weitere ähnliche Inhalte

Was ist angesagt?

Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
What the Hackers Do to Steal the Data?
What the Hackers Do to Steal the Data?What the Hackers Do to Steal the Data?
What the Hackers Do to Steal the Data?Digit Oktavianto
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 

Was ist angesagt? (20)

Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
What the Hackers Do to Steal the Data?
What the Hackers Do to Steal the Data?What the Hackers Do to Steal the Data?
What the Hackers Do to Steal the Data?
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 

Andere mochten auch

NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittJack Whitsitt
 
Clearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security ProfessionClearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security Professionaletarw
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (8)

NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
 
Clearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security ProfessionClearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security Profession
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Cyber Security Professionals Viewed via Supply Chain

CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014Peter ODell
 
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxMLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxijlalahmed11
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionalsCSA Argentina
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222KevinAlt1
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeDavid Ochel
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013DataTactics
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsBen Rothke
 

Ähnlich wie Cyber Security Professionals Viewed via Supply Chain (20)

CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014
 
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxMLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security Products
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 

Cyber Security Professionals Viewed via Supply Chain

  • 1. THE BIGGEST THREAT TO THE U.S. DIGITAL INFRASTRUCTURE: THE CYBER SECURITY WORKFORCE SUPPLY CHAIN Aleta Wilson, Ph.D. Amjad Ali, Ph.D. 1
  • 2. Overview • Study examines supply and demand for cybersecurity professionals • Progress impeded by lack of career field for cybersecurity professionals The Obama administration has declared that Protection of our digital infrastructure is a national security priority 2
  • 3. Scope • This study explores activities required to employ cyber security workers for the – federal government and – its contractor community • These two sectors comprise an estimated 500,000 workers – who must undergo a significant background check because – positions are considered as "national security positions". 3
  • 4. Scope and Methodology (cont) • Second focus of study is university level education and certifications -------- Methodology View the cyber workforce through the prism of a supply chain In other words.... How to optimize the supply chain to increase production 4
  • 5. Definition of a Cyber Security Professional 5
  • 6. Definition of a Cyber Security Professional - DOL • DOL Occupational Outlook Handbook does not contain a definition for cybersecurity professionals • DOL categories acknowledge positions that involve people who – plan, coordinate, and maintain an organization's information security – database administrators plan and coordinate security measures with network administrators – network engineers "may ... address information security issues” 6
  • 7. Definition of a Cyber Security Professional - DHS • Department of Homeland Security Secretary Janet Napolitano defines Cybersecurity professionals as – employees responsible for "... cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering“ 7
  • 8. Definition of a Cyber Security Professional – ISC2 – Frost & Sullivan conducted a survey of 10,413 information security professionals which indirectly defined security professionals as those • employed as Information Security professionals and • those who had cyber security as their primary job function. 8
  • 9. Definition of a Cyber Security Professional – DOD DOD usually takes the lead in defining elements related to cyberspace and cybersecurity, but according to GAO "DOD has defined some key cyber-related terms but it has not yet fully identified the specific types of operations and program elements that are associated with full-spectrum cyberspace operations" 9
  • 10. Definition of a Cyber Security Professional – Monster.com • What does the largest job site call them – Network engineers But where are the web – System Administrators designers; – IT Security Engineers policy folk; SW – IT Security Analysts engineers; etc. – Network Administrators etc. 10
  • 11. Definition of a Cyber Security Professional – for this study • Professionals who have information security as a major part of their job; • those who self-identify as cyber or security specialists; and, • those who build and maintain the national critical infrastructure of the computer systems on which the public and private sectors have come to rely. 11
  • 12. Now that we’ve defined them…. How do they get to the workplace…. 12
  • 13. Supply Chain Management (SCM) • Viewing the shortage of cybersecurity workers through SCM – SCM attacks problem of uncertainty head-on • SCM solves two core resource problems – Shortages and excesses – Identifies where the chain is broken 13
  • 14. Supply Chain Management (SCM) • STEM • Science Engineering Shortage K to 12 • Technology Math • Higher Education • Centers of Excellence Dilution • Other Higher Ed Institutions Higher Ed • Non- Higher Education Certifiers • Certifying CISSP (ISC2) Need • GSEC Professional • CompTIA Security+ Certification Certifications • Vendor certifications 14
  • 15. S.T.E.M. (K to 12) • Public private partnership will invest $260M between 2009 and 2019 (like race to space) • Growth in STEM jobs is 3X non- STEM jobs 15
  • 16. University Level Education • NSA is Certifying Universities, Colleges, and now Community Colleges • 124 NCA’s (as of 2010) – 14 are 2-year institutions – 2 are 4-year institutions – 51 are research institutions – Some fall into more than one category 16
  • 17. Certifications • Certifications can come from • Universities $$$$ / • Value is unkown • Private sector $$ / • Highly prized Highly recognized certificates 17
  • 18. Certifications – Highly Recognized ORGANIZATIONS AND THEIR CERTIFICATE OFFERINGS CERTIFYING CERTIFICATION ORGANIZATION CERT CSIH CompTIA Security+ Cisco Systems CCNA Security; CCSP; CCIE Security EC-Council ENSA; CEH; CHFI; ECSA; LPT; CNDA; ECIH; ECSS; ECVP; EDRP; ECSP; ESCO GIAC GSIF; GSEC; GCFW; GCIA; GCIH; GCUX; GCWN; GCED; GPEN; GWAPT; GAWN; GISP; GLSC; GCPM; GLEG; G7799; GSSP-NET; GSSP-JAVA; GCFE; GCFA; GREM; GSE ISAC CISA; CISM; CGEIT; CRISC (ISC)2 SSCP; CAP; CSSLP; CISSP; ISSAP; ISSEP; ISSMP ISECOM OPST; OPSA; OPSE; OWSE; CTA Microsoft MCSE, MCSA Indication individual is improving herself. 18
  • 19. What’s the Problem • STEM will not produce for 10 years and then those high schooler’s have to go to college • University pipeline is waiting for STEM graduates to enter • Universities are not graduating enough cyber specialists • University certificates are new and general • too soon to determine value 19
  • 20. So What • US has discovered it is behind the curve in the production of S.T.E.M graduates • S.T.E.M skills are needed for cybersecurity workforce • War has expanded beyond nation states to organizations like Wikileaks • Warfare is expanding into cyberspace and we do not have war fighters 20
  • 21. So What (cont) • Focusing on S.T.E.M in K-12 is critical to US economy • The field of cybersecurity is being developed in pieces • NIST, Microsoft, Cisco, & NSA are each • Designing standards models, processes, certifications, and methodologies for the field and many of them overlap 21
  • 22. Conclusion • The US government must take immediate steps to coordinate the development of the cybersecurity field • The US should task the National Security Agency to take the lead • Once the field is defined – There will be sub-specialties – There will be a roadmap for obtaining proficiency (like doctors & lawyers) – There will be standardized tests – Estimates on workforce needs can more accurately be determined – Training and certifications can be organized and synchronized 22
  • 23. Questions and Answers NSA designated National Center of Academic Excellence in Information Assurance Education 23