Watch the webinar here: https://www.infosecinstitute.com/webinar/nice-cybersecurity-workforce-framework/
The demand for skilled cybersecurity professionals continues to grow, and effectively closing that gap requires a shared set of expectations around common work roles, core competency areas and upskilling employees.
Join Leo Van Duyn, Cybersecurity & Technology Workforce Development Strategy at JPMorgan Chase & Co., and Bill Newhouse, Deputy Director of the National Initiative for Cybersecurity Education (NICE) in this on-demand webinar to learn how your organization can use the NICE Cybersecurity Workforce Framework to:
- Establish a common language around skill development
- Provide targeted, role-based training with competencies and KSAs
- Create custom role profiles to match your organization
- Better identify, hire and cross-train employees
2. Meet your
speakers
Leo Van Duyn
Guest speaker
Cybersecurity & Technology Workforce
Development Strategy, JPMorgan Chase & Co.
Bill Newhouse
Guest speaker
Deputy Director, National Initiative for
Cybersecurity Education (NICE)
Megan Sawle
Moderator
Director of Product Marketing, Infosec
3. Agenda
â—Ź NICE Cybersecurity Workforce Framework
â—Ź Cybersecurity Role Profiles
â—‹ SP 800-16 overview
â—‹ Competencies
â—‹ Using the NICE Framework Pivot Tool
â—Ź Creating a role-based training program
â—Ź Q&A
5. NICE Framework overview
NIST Special Publication 800-181
Provides a common language between government,
academia and the private sector
Categorizes, organizes and describes cybersecurity
work
Helps identify, recruit, develop and retain
cybersecurity talent
7. Cybersecurity Role Profiles for Training
NIST Special Publication 800-16
Revision 2 (Draft)
Introduces cybersecurity competencies as a new
component of the NICE Framework
Provides a process for developing cybersecurity
role profiles to deliver highly customized training
to your cybersecurity workforce
Helps management, cybersecurity workers and
training providers create, implement and evaluate
customized, role-based training
8. Risk
Management
Software
Development
Systems
Architecture
Systems
Development
Systems
Requirements
Planning
Technology
R&D
Test and
Evaluation
Cybersecurity
Management
Executive
Cyber
Leadership
Legal Advice
and Advocacy
Program/Projec
t Management
and Acquisition
Strategic
Planning and
Policy
Training,
Education and
Awareness
Customer
Service and
Tech Support
Data
Administration
Knowledge
Management
Network
Services
Systems
Administration
Systems
Analysis
All Source
Analysis
Exploitation
Analysis
Language
Analysis
Targets
Threat Analysis
Cyber Defense
Analyst
Cyber Defense
Infrastructure
Support
Incident
Response
Vulnerability
Assessment and
Management
Collection
Operations
Cyber
Operational
Planning
Cyber
Operations
Cyber
Investigation
Digital
Forensics
Securely
Provision
Oversee
and Govern
Operate and
Maintain
Analyze
Protect and
Defend
Collect and
Operate
Investigate
Categories (7)
A high-level grouping of common cybersecurity functions
Specialty Areas (33)
Distinct areas of cybersecurity work
Work Roles (52)
A collection of defined knowledge, skills, abilities
and tasks that make up a cybersecurity role
Categories and Specialty Areas
9. NICE competencies
Vulnerabilities Assessment
Infrastructure Design
Information Systems /
Network Security
Threat Analysis
Data Management
Information Assurance
Computer Network
Defense
Technical Operational Professional Leadership
Risk Management
Legal, Government and
Jurisprudence
Organizational Awareness
Data Privacy and
Protection
Contracting / Procurement
Business Continuity
Third Party Oversight /
Acquisition Management
Critical Thinking
Interpersonal Skills
Presenting Effectively
Written Communication
Oral Communication
Conflict Management
Teaching Others
Strategic Planning
Workforce Management
Project Management
Not all inclusive. Above are a sampling of the most leveraged competencies based on
mapping each of the KSAs from the NICE Framework.
10. Identify and create role profiles
NICE Framework Pivot Tool
(Excel File)
A cybersecurity role profile can be an existing NICE
Framework work role or a custom-crafted role
Review role requirements and ask if an existing
work role fits your training needs or if a custom role
profile needs to be created
Use the NICE Framework Pivot Tool to identify core
competencies and KSAs
13. Free year of Infosec Skills
($299)
And the winner is ...
14. Everyone gets a free week
of Infosec Skills.
Then it’s just $34/month
infosecinstitute.com/skills
15. About us
At Infosec, we believe knowledge is the most
powerful tool in the fight against cybercrime. We
provide the best certification and skills
development training for IT and security
professionals, as well as employee security
awareness training and phishing simulations.
infosecinstitute.com
708.689.0131
15