A Human Capital Crisis in Cybersecurity

A Human Capital Crisis in Cybersecurity
Title A Human Capital Crisis in Cybersecurity PDF eBook
Author Karen Evans
Publisher CSIS
Pages 46
Release 2010-11-15
Genre Political Science
ISBN 0892066091

Download A Human Capital Crisis in Cybersecurity Book in PDF, Epub and Kindle

Evidence continues to build showing our information infrastructure is vulnerable to threats not just from nation states but also from individuals and small groups who seek to do us harm or who wish to exploit our weaknesses for personal gain. A critical element of a robust cybersecurity strategy is having the right people at every level to identify, build and staff the defenses and responses. And that is, by many accounts, the area where we are the weakest.

Cybersecurity Human Capital

Cybersecurity Human Capital
Title Cybersecurity Human Capital PDF eBook
Author United States Government Accountability Office
Publisher Createspace Independent Publishing Platform
Pages 86
Release 2018-01-05
Genre
ISBN 9781983547195

Download Cybersecurity Human Capital Book in PDF, Epub and Kindle

Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination

Cybersecurity Human Capital :.

Cybersecurity Human Capital :.
Title Cybersecurity Human Capital :. PDF eBook
Author United States. Government Accountability Office
Publisher
Pages
Release 2011
Genre
ISBN

Download Cybersecurity Human Capital :. Book in PDF, Epub and Kindle

Cybersecurity Human Capital

Cybersecurity Human Capital
Title Cybersecurity Human Capital PDF eBook
Author U. s. Government Accountability Office
Publisher CreateSpace
Pages 88
Release 2012-06-22
Genre Computers
ISBN 9781478112143

Download Cybersecurity Human Capital Book in PDF, Epub and Kindle

GAO-12-8. Threats to federal information technology (IT) infrastructure and systems continue to grow in number and sophistication. The ability to make federal IT infrastructure and systems secure depends on the knowledge, skills, and abilities of the federal and contractor workforce that implements and maintains these systems. In light of the importance of recruiting and retaining cybersecurity personnel, GAO was asked to assess (1) the extent to which federal agencies have implemented and established workforce planning practices for cybersecurity personnel and (2) the status of and plans for governmentwide cybersecurity workforce initiatives. GAO evaluated eight federal agencies with the highest IT budgets to determine their use of workforce planning practices for cybersecurity staff by analyzing plans, performance measures, and other information. GAO also reviewed plans and programs at agencies with responsibility for governmentwide cybersecurity workforce initiatives. Federal agencies have taken varied steps to implement workforce planning practices for cybersecurity personnel. Five of eight agencies, including the largest, the Department of Defense, have established cybersecurity workforce plans or other agencywide activities addressing cybersecurity workforce planning. However, all of the agencies GAO reviewed faced challenges determining the size of their cybersecurity workforce because of variations in how work is defined and the lack of an occupational series specific to cybersecurity. With respect to other workforce planning practices, all agencies had defined roles and responsibilities for their cybersecurity workforce, but these roles did not always align with guidelines issued by the federal Chief Information Officers Council and National Institute of Standards and Technology (NIST). Agencies reported challenges in filling highly technical positions, challenges due to the length and complexity of the federal hiring process, and discrepancies in compensation across agencies. Although most agencies used some form of incentives to support their cybersecurity workforce, none of the eight agencies had metrics to measure the effectiveness of these incentives. Finally, the robustness and availability of cybersecurity training and development programs varied significantly among the agencies. For example, the Departments of Commerce and Defense required cybersecurity personnel to obtain certifications and fulfill continuing education requirements. Other agencies used an informal or ad hoc approach to identifying required training. The federal government has begun several governmentwide initiatives to enhance the federal cybersecurity workforce. The National Initiative for Cybersecurity Education, coordinated by NIST, includes activities to examine and more clearly define the federal cybersecurity workforce structure and roles and responsibilities, and to improve cybersecurity workforce training. However, the initiative lacks plans defining tasks and milestones to achieve its objectives, a clear list of agency activities that are part of the initiative, and a means to measure the progress of each activity. The Chief Information Officers Council, NIST, Office of Personnel Management, and the Department of Homeland Security (DHS) have also taken steps to define skills, competencies, roles, and responsibilities for the federal cybersecurity workforce. However, these efforts overlap and are potentially duplicative, although officials from these agencies reported beginning to take steps to coordinate activities. Furthermore, there is no plan to promote use of the outcomes of these efforts by individual agencies. ~

Cybersecurity Human Capital

Cybersecurity Human Capital
Title Cybersecurity Human Capital PDF eBook
Author United States. Government Accountability Office
Publisher
Pages 80
Release 2011
Genre Civil service
ISBN

Download Cybersecurity Human Capital Book in PDF, Epub and Kindle

Threats to federal information technology (IT) infrastructure and systems continue to grow in number and sophistication. The ability to make federal IT infrastructure and systems secure depends on the knowledge, skills, and abilities of the federal and contractor workforce that implements and maintains these systems. In light of the importance of recruiting and retaining cybersecurity personnel, GAO was asked to assess (1) the extent to which federal agencies have implemented and established workforce planning practices for cybersecurity personnel and (2) the status of and plans for governmentwide cybersecurity workforce initiatives. GAO evaluated eight federal agencies with the highest IT budgets to determine their use of workforce planning practices for cybersecurity staff by analyzing plans, performance measures, and other information. GAO also reviewed plans and programs at agencies with responsibility for governmentwide cybersecurity workforce initiatives.

Cybersecurity Human Capital

Cybersecurity Human Capital
Title Cybersecurity Human Capital PDF eBook
Author U S Government Accountability Office (G
Publisher BiblioGov
Pages 90
Release 2013-06
Genre
ISBN 9781289130268

Download Cybersecurity Human Capital Book in PDF, Epub and Kindle

The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. The GAO watches over Congress, and investigates how the federal government spends taxpayers dollars. The Comptroller General of the United States is the leader of the GAO, and is appointed to a 15-year term by the U.S. President. The GAO wants to support Congress, while at the same time doing right by the citizens of the United States. They audit, investigate, perform analyses, issue legal decisions and report anything that the government is doing. This is one of their reports.

Hackers Wanted

Hackers Wanted
Title Hackers Wanted PDF eBook
Author Martin C. Libicki
Publisher Rand Corporation
Pages 107
Release 2014-06-18
Genre Political Science
ISBN 0833085018

Download Hackers Wanted Book in PDF, Epub and Kindle

The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.