SlideShare a Scribd company logo
1 of 5
**Please ensure assignment is Plagiarism Free***
***Please write in Active Voice***
Topic of Discussion: Interagency cooperation
1. What are some key considerations for interagency
cooperation that
Influence the Combatant Commander (CCDR) and Joint Task
Force (JTF)
Commander in the development/execution of operations?
2. Also, describe one of the interagency and why it is important
to understand interagency cooperation.
Assignment Instructions:
Write a minimum of 300 words, with at least 2 cited sources
(provided), to the
Topic above. Identify references following the post using APA
format.
Sources:
Joint Publication 3-08
Interorganizational Cooperation
https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_0
8pa.pdf?ver=2018-02-
08-091414-467
Joint Publication 3-05
Special Operations
https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_0
5.pdf
Joint Publication 3-16
Multinational Operations
https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_1
6.pdf
ADRP
CSIA 360: Cybersecurity in Government Organizations
Project 4 Solving the Cybersecurity Workforce Crisis
For this project, you will research and report on the
cybersecurity workforce crisis as it affects state governments.
Your audience will be the members of an organization for state
government officials such as the National Governor’s
Association and the National Association of State Chief
Information Officers. The results of your research project will
help develop a one-day workshop on strategies for developing
and growing the cybersecurity workforce at the state
government level. Research:
1. Read / Review the Week 5 readings.
2. Research authoritative sources which discuss the reasons why
the cybersecurity workforce crisis exists.
a. Hiring Cybersecurity Staff is Hard for
Stateshttp://https://www.pewtrusts.org/en/research-and-
analysis/blogs/stateline/2015/5/11/hiring-cybersecurity-staff-is-
hard-for-states
b. NGA Releases Report Advising States on Decreasing the
Skills Gap in the Labor Force https://www.nga.org/wp-
content/uploads/2018/07/NGA_Talent-Driven-
Economy_RoadMap.pdf
c. Comparing Private Sector and Government Worker
Salarieshttp://reason.org/news/show/public-sector-private-
sector-salary (This source argues both sides of the
compensation / education arguments.)
d. Budgetary Constraints (p. 3, Figure
1.4)http://www.csg.org/knowledgecenter/docs/ta0210workshorta
ge.pdf
e. IT Workforce hiring
issues:http://www.nascio.org/Portals/0/Publications/Documents/
NASCIO_ITWorkforce_UnderPressure.pdf
f. State vs Private Compensation (see “Conclusions” on p.
15)https://www.aei.org/wp-content/uploads/2014/04/-biggs-
overpaid-or-underpaid-a-statebystate-ranking-of-public-
employee-compensation_112536583046.pdf
g. Global talent gaphttp://thehill.com/blogs/congress-
blog/technology/239113-cybersecurity-talent-worse-than-a-
skills-shortage-its-a
3. Review the best practice recommendations from the NICE
report. Select three to five best practices which state
governments could benefit from implementing. https://niccs.us-
cert.gov/sites/default/files/documents/pdf/best_practices_for_pl
anning_a_cybersecurity_workforce_white%20paper_0_0.pdf
4. Review alternative recommendations for attracting and
retaining qualified talent (workers) to a state or region. Select 3
or more recommendations that you believe would be beneficial
for state government hiring efforts for cybersecurity personnel.
a. 7 Ways to Attract and Retain Talent (without having to
compete on salaries)
http://www.oyginc.com/articles/attractarticle1/
b. Government Needs to Rethink How They Attract IT Talent
http://www.governing.com/columns/tech-talk/gov-remaking-
your-workforce.html
c. Desperate for Cybersecurity Workers, States Help Build the
Next Generation https://www.governing.com/topics/mgmt/sl-
cybersecurity-women-veterans-students.html
d. About Good Neighbor Next Door (ask yourself if this
program or something similar should be extended to
cybersecurity personnel)
http://portal.hud.gov/hudportal/HUD?src=/program_offices/hous
ing/sfh/reo/goodn/gnndabot
5. A separate closing section in which you summarize your
research and recommendations.
Write:
Write a three- to four-page research report that includes a
summary of your research, findings, and recommendations. At a
minimum, your paper must include the following:
1. An introduction or overview of the cybersecurity workforce
issues which impact State governments. This overview should
address the political, economic, socio-cultural (including
education), and technological factors that contribute to the
perceived lack of qualified cybersecurity workers. This
introduction should be suitable for an executive audience.
2. A separate section that addresses five specific reasons why
states have difficulty hiring enough trained and qualified
cybersecurity workers for positions in state agencies and
offices.
3. A separate section that addresses five specific “non-
cybersecurity” reasons why a workforce shortage affecting state
governments may currently exist. Consider and discuss whether
the workforce shortage arises out of state budget problems
rather than training and education or salary.
4. A recommendations section which identifies and discusses at
least five training, education, marketing, or hiring actions that
state governments could take to attract cybersecurity talent and
reduce or alleviate a cybersecurity workforce shortage for
trained and qualified cybersecurity personnel. These
recommendations should include several alternative practices
which deemphasize salary.
5. A separate Summary section in which you present a summary
of your research and recommendations.
Submit for Grading
Submit your work in MS Word format (.docx or .doc file) using
the Project 4 entry in your assignment folder. (Attach the file.)
Additional Information
1. Consult the grading rubric for specific content and formatting
requirements for this assignment.
2. Your 3- to 4-page paper should be professional in appearance
with consistent use of fonts, font sizes, margins, etc. You
should use headings and page breaks to organize your paper.
3. Your paper should use standard terms and definitions for
cybersecurity. See Course Resources > Cybersecurity Concepts
Review for recommended resources.
4. The CSIA program recommends that you follow standard
APA formatting since this will give you a document that meets
the “professional appearance” requirements. APA formatting
guidelines and examples are found under Course Resources >
APA Resources. An APA template file (MS Word format) has
also been provided for your use
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You must include a cover page with the assignment title, your
name, and the due date. Your reference list must be on a
separate page at the end of your file. These pages do not count
towards the assignment’s page count.
6. You should write grammatically correct English in every
assignment that you submit for grading. Do not turn in any work
without (a) using spell check, (b) using grammar check, (c)
verifying that your punctuation is correct and (d) reviewing
your work for correct word usage and correctly structured
sentences and paragraphs.
7. You must credit your sources using in-text citations and
reference list entries. Both your citations and your reference list
entries must follow a consistent citation style (APA, MLA,
etc.).
Copyright ©2020 by University of Maryland University
College. All Rights Reserved

More Related Content

Similar to Please ensure assignment is Plagiarism FreePlease write

Course SyllabusCourse DescriptionProvides a comprehens
Course SyllabusCourse DescriptionProvides a comprehensCourse SyllabusCourse DescriptionProvides a comprehens
Course SyllabusCourse DescriptionProvides a comprehens
CruzIbarra161
 

Similar to Please ensure assignment is Plagiarism FreePlease write (8)

A review of the features/tutorialoutlet
A review of the features/tutorialoutletA review of the features/tutorialoutlet
A review of the features/tutorialoutlet
 
Cis 512 week 10 term paper strayer new
Cis 512 week 10 term paper   strayer newCis 512 week 10 term paper   strayer new
Cis 512 week 10 term paper strayer new
 
Cis 512 week 10 term paper strayer new
Cis 512 week 10 term paper   strayer newCis 512 week 10 term paper   strayer new
Cis 512 week 10 term paper strayer new
 
Cis 512 week 10 term paper strayer new
Cis 512 week 10 term paper   strayer newCis 512 week 10 term paper   strayer new
Cis 512 week 10 term paper strayer new
 
Cis 512 week 10 term paper strayer new
Cis 512 week 10 term paper   strayer newCis 512 week 10 term paper   strayer new
Cis 512 week 10 term paper strayer new
 
Term Paper: Virtualization
Term Paper: VirtualizationTerm Paper: Virtualization
Term Paper: Virtualization
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
Course SyllabusCourse DescriptionProvides a comprehens
Course SyllabusCourse DescriptionProvides a comprehensCourse SyllabusCourse DescriptionProvides a comprehens
Course SyllabusCourse DescriptionProvides a comprehens
 

More from isbelsejx0m

Review the 12 principles presented by Hardina et al. in the sectio.docx
Review the 12 principles presented by Hardina et al. in the sectio.docxReview the 12 principles presented by Hardina et al. in the sectio.docx
Review the 12 principles presented by Hardina et al. in the sectio.docx
isbelsejx0m
 
Returning Warriors Organization (RWO)Returning Warriors Organiza.docx
Returning Warriors Organization (RWO)Returning Warriors Organiza.docxReturning Warriors Organization (RWO)Returning Warriors Organiza.docx
Returning Warriors Organization (RWO)Returning Warriors Organiza.docx
isbelsejx0m
 
Respond in one of the following waysShare additional potential .docx
Respond in one of the following waysShare additional potential .docxRespond in one of the following waysShare additional potential .docx
Respond in one of the following waysShare additional potential .docx
isbelsejx0m
 
Respond by offering an alternative perspective of the most impor.docx
Respond by offering an alternative perspective of the most impor.docxRespond by offering an alternative perspective of the most impor.docx
Respond by offering an alternative perspective of the most impor.docx
isbelsejx0m
 
Response with 2-3 sentences to each one below 1. Goals and O.docx
Response with 2-3 sentences to each one below 1. Goals and O.docxResponse with 2-3 sentences to each one below 1. Goals and O.docx
Response with 2-3 sentences to each one below 1. Goals and O.docx
isbelsejx0m
 
Respond to two out of the three discussion questions below.  Be sure.docx
Respond to two out of the three discussion questions below.  Be sure.docxRespond to two out of the three discussion questions below.  Be sure.docx
Respond to two out of the three discussion questions below.  Be sure.docx
isbelsejx0m
 

More from isbelsejx0m (20)

Review Gasping for Breath The Administrative Flaws of Federal Haza.docx
Review Gasping for Breath The Administrative Flaws of Federal Haza.docxReview Gasping for Breath The Administrative Flaws of Federal Haza.docx
Review Gasping for Breath The Administrative Flaws of Federal Haza.docx
 
Review summary of  Preconception Gender  Selection”  by Dr. John Ro.docx
Review summary of  Preconception Gender  Selection”  by Dr. John Ro.docxReview summary of  Preconception Gender  Selection”  by Dr. John Ro.docx
Review summary of  Preconception Gender  Selection”  by Dr. John Ro.docx
 
Review the 12 principles presented by Hardina et al. in the sectio.docx
Review the 12 principles presented by Hardina et al. in the sectio.docxReview the 12 principles presented by Hardina et al. in the sectio.docx
Review the 12 principles presented by Hardina et al. in the sectio.docx
 
Review emerging standards of culturally competent care. Here are pos.docx
Review emerging standards of culturally competent care. Here are pos.docxReview emerging standards of culturally competent care. Here are pos.docx
Review emerging standards of culturally competent care. Here are pos.docx
 
Review Biofuel Contribution to Mitigate Fossil Fuel CO2 Emissions” .docx
Review Biofuel Contribution to Mitigate Fossil Fuel CO2 Emissions” .docxReview Biofuel Contribution to Mitigate Fossil Fuel CO2 Emissions” .docx
Review Biofuel Contribution to Mitigate Fossil Fuel CO2 Emissions” .docx
 
Review Biomass Energy Sustainable Solution for Greenhouse Gas Emis.docx
Review Biomass Energy Sustainable Solution for Greenhouse Gas Emis.docxReview Biomass Energy Sustainable Solution for Greenhouse Gas Emis.docx
Review Biomass Energy Sustainable Solution for Greenhouse Gas Emis.docx
 
Review and reflect on the knowledge you have gained from this course.docx
Review and reflect on the knowledge you have gained from this course.docxReview and reflect on the knowledge you have gained from this course.docx
Review and reflect on the knowledge you have gained from this course.docx
 
Returning Warriors Organization (RWO)Returning Warriors Organiza.docx
Returning Warriors Organization (RWO)Returning Warriors Organiza.docxReturning Warriors Organization (RWO)Returning Warriors Organiza.docx
Returning Warriors Organization (RWO)Returning Warriors Organiza.docx
 
Response to the Attacks of 911The events of 911 devastated o.docx
Response to the Attacks of 911The events of 911 devastated o.docxResponse to the Attacks of 911The events of 911 devastated o.docx
Response to the Attacks of 911The events of 911 devastated o.docx
 
Response must be doubles spaced and in essay format.  The book use.docx
Response must be doubles spaced and in essay format.  The book use.docxResponse must be doubles spaced and in essay format.  The book use.docx
Response must be doubles spaced and in essay format.  The book use.docx
 
Respond in one of the following waysShare additional potential .docx
Respond in one of the following waysShare additional potential .docxRespond in one of the following waysShare additional potential .docx
Respond in one of the following waysShare additional potential .docx
 
Responsibility in EngineeringDirections Please answer the quest.docx
Responsibility in EngineeringDirections Please answer the quest.docxResponsibility in EngineeringDirections Please answer the quest.docx
Responsibility in EngineeringDirections Please answer the quest.docx
 
Responsibility I Assess Needs, Assets & Capacity for Health Educati.docx
Responsibility I Assess Needs, Assets & Capacity for Health Educati.docxResponsibility I Assess Needs, Assets & Capacity for Health Educati.docx
Responsibility I Assess Needs, Assets & Capacity for Health Educati.docx
 
Respond by offering an alternative perspective of the most impor.docx
Respond by offering an alternative perspective of the most impor.docxRespond by offering an alternative perspective of the most impor.docx
Respond by offering an alternative perspective of the most impor.docx
 
Responses to each topic should be a minimum of one paragraph in leng.docx
Responses to each topic should be a minimum of one paragraph in leng.docxResponses to each topic should be a minimum of one paragraph in leng.docx
Responses to each topic should be a minimum of one paragraph in leng.docx
 
response to d.b. interviewing and interrogationThe psychologic.docx
response to d.b. interviewing and interrogationThe psychologic.docxresponse to d.b. interviewing and interrogationThe psychologic.docx
response to d.b. interviewing and interrogationThe psychologic.docx
 
Response with 2-3 sentences to each one below 1. Goals and O.docx
Response with 2-3 sentences to each one below 1. Goals and O.docxResponse with 2-3 sentences to each one below 1. Goals and O.docx
Response with 2-3 sentences to each one below 1. Goals and O.docx
 
Respond to two out of the three discussion questions below.  Be sure.docx
Respond to two out of the three discussion questions below.  Be sure.docxRespond to two out of the three discussion questions below.  Be sure.docx
Respond to two out of the three discussion questions below.  Be sure.docx
 
Respond to the following questionUsing Figure 2.1 in your textboo.docx
Respond to the following questionUsing Figure 2.1 in your textboo.docxRespond to the following questionUsing Figure 2.1 in your textboo.docx
Respond to the following questionUsing Figure 2.1 in your textboo.docx
 
Respond to the question below in no less than three sentences. Be su.docx
Respond to the question below in no less than three sentences. Be su.docxRespond to the question below in no less than three sentences. Be su.docx
Respond to the question below in no less than three sentences. Be su.docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Please ensure assignment is Plagiarism FreePlease write

  • 1. **Please ensure assignment is Plagiarism Free*** ***Please write in Active Voice*** Topic of Discussion: Interagency cooperation 1. What are some key considerations for interagency cooperation that Influence the Combatant Commander (CCDR) and Joint Task Force (JTF) Commander in the development/execution of operations? 2. Also, describe one of the interagency and why it is important to understand interagency cooperation. Assignment Instructions: Write a minimum of 300 words, with at least 2 cited sources (provided), to the Topic above. Identify references following the post using APA format. Sources: Joint Publication 3-08 Interorganizational Cooperation https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_0 8pa.pdf?ver=2018-02- 08-091414-467 Joint Publication 3-05 Special Operations https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_0 5.pdf Joint Publication 3-16 Multinational Operations https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_1
  • 2. 6.pdf ADRP CSIA 360: Cybersecurity in Government Organizations Project 4 Solving the Cybersecurity Workforce Crisis For this project, you will research and report on the cybersecurity workforce crisis as it affects state governments. Your audience will be the members of an organization for state government officials such as the National Governor’s Association and the National Association of State Chief Information Officers. The results of your research project will help develop a one-day workshop on strategies for developing and growing the cybersecurity workforce at the state government level. Research: 1. Read / Review the Week 5 readings. 2. Research authoritative sources which discuss the reasons why the cybersecurity workforce crisis exists. a. Hiring Cybersecurity Staff is Hard for Stateshttp://https://www.pewtrusts.org/en/research-and- analysis/blogs/stateline/2015/5/11/hiring-cybersecurity-staff-is- hard-for-states b. NGA Releases Report Advising States on Decreasing the Skills Gap in the Labor Force https://www.nga.org/wp- content/uploads/2018/07/NGA_Talent-Driven- Economy_RoadMap.pdf c. Comparing Private Sector and Government Worker Salarieshttp://reason.org/news/show/public-sector-private- sector-salary (This source argues both sides of the compensation / education arguments.) d. Budgetary Constraints (p. 3, Figure 1.4)http://www.csg.org/knowledgecenter/docs/ta0210workshorta ge.pdf e. IT Workforce hiring issues:http://www.nascio.org/Portals/0/Publications/Documents/
  • 3. NASCIO_ITWorkforce_UnderPressure.pdf f. State vs Private Compensation (see “Conclusions” on p. 15)https://www.aei.org/wp-content/uploads/2014/04/-biggs- overpaid-or-underpaid-a-statebystate-ranking-of-public- employee-compensation_112536583046.pdf g. Global talent gaphttp://thehill.com/blogs/congress- blog/technology/239113-cybersecurity-talent-worse-than-a- skills-shortage-its-a 3. Review the best practice recommendations from the NICE report. Select three to five best practices which state governments could benefit from implementing. https://niccs.us- cert.gov/sites/default/files/documents/pdf/best_practices_for_pl anning_a_cybersecurity_workforce_white%20paper_0_0.pdf 4. Review alternative recommendations for attracting and retaining qualified talent (workers) to a state or region. Select 3 or more recommendations that you believe would be beneficial for state government hiring efforts for cybersecurity personnel. a. 7 Ways to Attract and Retain Talent (without having to compete on salaries) http://www.oyginc.com/articles/attractarticle1/ b. Government Needs to Rethink How They Attract IT Talent http://www.governing.com/columns/tech-talk/gov-remaking- your-workforce.html c. Desperate for Cybersecurity Workers, States Help Build the Next Generation https://www.governing.com/topics/mgmt/sl- cybersecurity-women-veterans-students.html d. About Good Neighbor Next Door (ask yourself if this program or something similar should be extended to cybersecurity personnel) http://portal.hud.gov/hudportal/HUD?src=/program_offices/hous ing/sfh/reo/goodn/gnndabot 5. A separate closing section in which you summarize your research and recommendations. Write: Write a three- to four-page research report that includes a
  • 4. summary of your research, findings, and recommendations. At a minimum, your paper must include the following: 1. An introduction or overview of the cybersecurity workforce issues which impact State governments. This overview should address the political, economic, socio-cultural (including education), and technological factors that contribute to the perceived lack of qualified cybersecurity workers. This introduction should be suitable for an executive audience. 2. A separate section that addresses five specific reasons why states have difficulty hiring enough trained and qualified cybersecurity workers for positions in state agencies and offices. 3. A separate section that addresses five specific “non- cybersecurity” reasons why a workforce shortage affecting state governments may currently exist. Consider and discuss whether the workforce shortage arises out of state budget problems rather than training and education or salary. 4. A recommendations section which identifies and discusses at least five training, education, marketing, or hiring actions that state governments could take to attract cybersecurity talent and reduce or alleviate a cybersecurity workforce shortage for trained and qualified cybersecurity personnel. These recommendations should include several alternative practices which deemphasize salary. 5. A separate Summary section in which you present a summary of your research and recommendations. Submit for Grading Submit your work in MS Word format (.docx or .doc file) using the Project 4 entry in your assignment folder. (Attach the file.) Additional Information 1. Consult the grading rubric for specific content and formatting requirements for this assignment. 2. Your 3- to 4-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You
  • 5. should use headings and page breaks to organize your paper. 3. Your paper should use standard terms and definitions for cybersecurity. See Course Resources > Cybersecurity Concepts Review for recommended resources. 4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). Copyright ©2020 by University of Maryland University College. All Rights Reserved