SlideShare a Scribd company logo
Vision
A digital economy enabled by a
knowledgeable and skilled
cybersecurity workforce.
2
Mission of NICE
To energize and promote a robust network and
an ecosystem of cybersecurity education,
training, and workforce development.
3
Accelerate Learning and Skills Development
Inspire a sense of urgency
in both the public and
private sectors to address
the shortage of skilled
cybersecurity workers
4
Nurture A Diverse Learning Community
Strengthen education and
training across the ecosystem
to emphasize learning,
measure outcomes, and
diversify the cybersecurity
workforce
5
Guide Career Development & Workforce Planning
Support employers to
address market demands
and enhance recruitment,
hiring, development, and
retention of cybersecurity
talent
6
7
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present and future demand and supply of
qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce
Framework and encourage adoption
3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce
needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
NICE Cybersecurity Workforce Framework – Draft NIST SP 800-181
Reference Resource for cybersecurity workforce development
• Specialty Areas (33) – Distinct areas of cybersecurity work;
• Work Roles (52) – The most detailed groupings of IT, cybersecurity or cyber-related work,
which include specific knowledge, skills, and abilities required to perform a set of tasks.
• Tasks – Specific work activities that could be assigned to a professional working in one of
the NCWF’s Work Roles; and,
• Knowledge, Skills, and Abilities (KSAs) –
• Attributes required to perform Tasks, generally
demonstrated through relevant experience
or performance-based education and training.
• Audience:
• Employers
• Current and Future Cybersecurity Workers
• Training and Certification Providers
• Education Providers
• Technology Providers
SECURELY
PROVISION
PROTECT
AND
DEFEND
OPERATE
AND
MAINTAIN
OVERSEE
AND
GOVERN
COLLECT
AND
OPERATE
INVESTIGATEANALYZE
Securely Provision (7 Specialty Areas, 11 Work Roles)
9
Category Specialty Area Work Role
Securely
Provision
Risk Management
Authorizing Official/Designating Representative
Security Control Assessor
Software Development
Software Developer
Secure Software Assessor
Systems Architecture
Enterprise Architect
Security Architect
Technology R&D Research & Development Specialist
Systems Requirements
Planning
Systems Requirements Planner
Test and Evaluation Testing and Evaluation Specialist
Systems Development
Information Systems Security Developer
Systems Developer
Operate and Maintain (6 Specialty Areas, 7 Work Roles)
10
Category Specialty Area Work Role
Operate and
Maintain
Data Administration
Database Administrator
Data Analyst
Knowledge Management Knowledge Manager
Customer Service and
Technical Support
Technical Support Specialist
Network Services Network Operations Specialist
Systems Administration System Administrator
Systems Analysis Systems Security Analyst
Oversee and Govern (6 Specialty Areas, 14 Work Roles)
11
Category Specialty Area Work Role
Oversee
and Govern
Legal Advice and Advocacy
Cyber Legal Advisor
Privacy Compliance Manager
Training, Education, and
Awareness
Cyber Instructional Curriculum Developer
Cyber Instructor
Cybersecurity Management
Information Systems Security Manager
COMSEC Manager
Strategic Planning and Policy
Cyber Workforce Developer and Manager
Cyber Policy and Strategy Planner
Executive Cyber Leadership Executive Cyber Leadership
Acquisition and
Program/Project
Management
Program Manager
IT Project Manager
Product Support Manager
IT Investment/Portfolio Manager
IT Program Auditor
Protect and Defend (4 Specialty Areas, 4 Work Roles)
12
Category Specialty Area Work Role
Protect and
Defend
Cyber Defense Analysis Cyber Defense Analyst
Cyber Defense Infrastructure
Support
Cyber Defense Infrastructure Support Specialist
Incident Response Cyber Defense Incident Responder
Vulnerability Assessment and
Management
Vulnerability Assessment Analyst
Analyze (5 Specialty Areas, 7 Work Roles)
13
Category Specialty Area Work Role
Analyze
Threat Analysis Warning Analyst
Exploitation Analysis Exploitation Analyst
All-Source Analysis
All-Source Analyst
Mission Assessment Specialist
Targets
Target Developer
Target Network Analyst
Language Analysis Multi-Disciplined Language Analyst
Operate and Collect (3 Specialty Areas, 6 Work Roles)
14
Category Specialty Area Work Role
Collect and
Operate
Collection Operations
All Source-Collection Manager
All Source-Collection Requirements Manager
Cyber Operational Planning
Cyber Intel Planner
Cyber Ops Planner
Partner Integration Planner
Cyber Operations Cyber Operator
Investigate (2 Specialty Areas, 3 Work Roles)
15
Category Specialty Area Work Role
Investigate
Cyber Investigation Cyber Crime Investigator
Digital Forensics
Forensics Analyst
Cyber Defense Forensics Analyst
16
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present
and future demand and supply of qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage
adoption
3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce
needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
17
18
19
20
21
22
23
Enabling the Cybersecurity Workforce of Tomorrow
The NICE Challenge Project was created to develop virtual
challenges and environments to evaluate students and
professionals alike on their ability to perform NICE
Cybersecurity Workforce Framework tasks and exhibit their
knowledge, skills, and abilities. Whether it’s supporting the
teaching of competencies to students or evaluating the
competencies of professionals, we’ve got you covered.
NICE Challenge Project Building Blocks
Platform
 We run & host the hardware, no
upfront investment required
• Powerful & highly accessible web
interface, no installs required
• Enables specialized content
development, deployment, &
analysis
Environments
• Full scale context rich
environments inspired by NICE
Cybersecurity Workforce
Framework Categories
• Fictional organizations &
employees
• Virtualized networks, servers, &
employee desktops
Challenges
• Competency based assessments
focused on real world problems &
context
• Maps to NICE Cybersecurity
Workforce Framework Tasks/KSAs
& CAE KUs
• Designed to capture useful data
for actionable metrics & analytics
26
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present and future demand and supply of
qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage
adoption
3.3 Facilitate state and regional consortia to identify cybersecurity
pathways addressing local workforce needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
Regional Alliances & Multistakeholder Partnerships
• RAMPS for Cybersecurity Education & Workforce
• Job-Driven Training Principles
 Engaging Employers
 Earn and Learn
 Smart Choices
 Measuring Matters
 Stepping Stones
 Opening Doors
 Regional Partnerships
27
RAMPS Communities
RAMPS Communities
Southwest Region: Arizona Statewide Cyber Workforce
Consortium
Western Region: Cyber Prep Program
Central Region: Cincinnati-Dayton Cyber Corridor
(Cin-Day Cyber)
Mid-Atlantic Region: Hampton Roads Cybersecurity
Education, Workforce, and Economic Development
Alliance (HRCyber)
Northeast Region: The Partnership to Advance
Cybersecurity Education and Training (PACET)
29
Examples of Affiliated Programs
• DHS/NSA Centers of Academic Excellence in
Cybersecurity – 2Y, Cyber Defense Ed, Research
• NSA Centers of Academic Excellence in Cyber
Operations
• NSF Advanced Technological Education Centers
• CyberCorps: Scholarship for Service Program
• GenCyber Summer Camps
• And more . . .
30
Centers of Academic Excellence in Cybersecurity
31
Roadmap to Growing and Sustaining Workforce
Community-Oriented
Employer-Led
Learner-Centered
Standards-Based
Outcomes-Driven
32
Cybersecurity Executive Order
Cybersecurity for the Nation: Policy
To ensure that the internet remains valuable for future
generations, it is the policy of the executive branch to
promote an open, interoperable, reliable, and secure
internet that fosters efficiency, innovation,
communication, and economic prosperity, while
respecting privacy and guarding against disruption,
fraud, and theft. Further, the United States seeks to
support the growth and sustainment of a workforce
that is skilled in cybersecurity and related fields as the
foundation for achieving our objectives in cyberspace.
33
Workforce Development Provision
Purpose:
In order to ensure that the United States maintains a
long-term cybersecurity advantage . . .
Three Deliverables:
• Growing and Sustaining the Cybersecurity Workforce
• International Competiveness
• National Security Advantage
Website:
nist.gov/nice/cybersecurityworkforce
34
Public and Private Sector Workforce
• Assess the scope and sufficiency of efforts to
educate and train the American cybersecurity
workforce of the future, including cybersecurity-
related education curricula, training, and
apprenticeship programs, from primary through
higher education
• Provide a report to the President within 120 days
with findings and recommendations regarding how
to support the growth and sustainment of the
Nation's cybersecurity workforce in both the public
and private sectors.
35
NICE Engagement Process
• NICE Working Group
Subgroups: K-12, Collegiate, Competitions, Training and Certifications,
and Workforce Management
• NICE Interagency Coordinating Council
• NICE Webinars (Monthly)
• NICE eNewsletter (Quarterly)
• NICE Email Updates (Periodic)
• NICE Events
Annual Conference & Expo: November 7-8, 2017, Dayton, OH
NICE K-12 Cybersecurity Education Conference: Dec 3-4, Nashville, TN
• NICE Website: nist.gov/nice
36
Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017

More Related Content

Similar to Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Bachir Benyammi
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
robbiesamuel
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
Candan BOLUKBAS
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
3aw307
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Martin M
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
Commonwealth Telecommunications Organisation
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
Rotary International
 
Training CV
Training CVTraining CV
Training CV
widyanhms
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
Marlabs
 
the_five_functions.pptx
the_five_functions.pptxthe_five_functions.pptx
the_five_functions.pptx
ssuser2428171
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
Cyber Security Academy
 
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
Sandra Gesing
 
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
Abid Ur Rehman
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
new cv
new cvnew cv
new cv
tamer sayed
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
Infosec
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
Infosec train
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
priyanshamadhwal2
 

Similar to Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017 (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
Training CV
Training CVTraining CV
Training CV
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
the_five_functions.pptx
the_five_functions.pptxthe_five_functions.pptx
the_five_functions.pptx
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
 
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
 
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
new cv
new cvnew cv
new cv
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 

More from Dawn Yankeelov

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
Dawn Yankeelov
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
Dawn Yankeelov
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding Reopening
Dawn Yankeelov
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Dawn Yankeelov
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
Dawn Yankeelov
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David Carter
Dawn Yankeelov
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
Dawn Yankeelov
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISO
Dawn Yankeelov
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Dawn Yankeelov
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
Dawn Yankeelov
 
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Dawn Yankeelov
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions
Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
Dawn Yankeelov
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
Dawn Yankeelov
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
Dawn Yankeelov
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KY
Dawn Yankeelov
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Dawn Yankeelov
 
Espoo Innovation Garden: Open Innovation Works for You
Espoo Innovation Garden: Open Innovation Works for YouEspoo Innovation Garden: Open Innovation Works for You
Espoo Innovation Garden: Open Innovation Works for You
Dawn Yankeelov
 

More from Dawn Yankeelov (20)

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding Reopening
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David Carter
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISO
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KY
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
 
Espoo Innovation Garden: Open Innovation Works for You
Espoo Innovation Garden: Open Innovation Works for YouEspoo Innovation Garden: Open Innovation Works for You
Espoo Innovation Garden: Open Innovation Works for You
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017

  • 1.
  • 2. Vision A digital economy enabled by a knowledgeable and skilled cybersecurity workforce. 2
  • 3. Mission of NICE To energize and promote a robust network and an ecosystem of cybersecurity education, training, and workforce development. 3
  • 4. Accelerate Learning and Skills Development Inspire a sense of urgency in both the public and private sectors to address the shortage of skilled cybersecurity workers 4
  • 5. Nurture A Diverse Learning Community Strengthen education and training across the ecosystem to emphasize learning, measure outcomes, and diversify the cybersecurity workforce 5
  • 6. Guide Career Development & Workforce Planning Support employers to address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent 6
  • 7. 7 Support employers to address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent Objectives: 3.1 Identify and analyze data sources that support projecting present and future demand and supply of qualified cybersecurity workers 3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage adoption 3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce needs 3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring, development, and retention of cybersecurity professionals 3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce planning NICE Strategic Goal #3: Guide Career Development and Workforce Planning
  • 8. NICE Cybersecurity Workforce Framework – Draft NIST SP 800-181 Reference Resource for cybersecurity workforce development • Specialty Areas (33) – Distinct areas of cybersecurity work; • Work Roles (52) – The most detailed groupings of IT, cybersecurity or cyber-related work, which include specific knowledge, skills, and abilities required to perform a set of tasks. • Tasks – Specific work activities that could be assigned to a professional working in one of the NCWF’s Work Roles; and, • Knowledge, Skills, and Abilities (KSAs) – • Attributes required to perform Tasks, generally demonstrated through relevant experience or performance-based education and training. • Audience: • Employers • Current and Future Cybersecurity Workers • Training and Certification Providers • Education Providers • Technology Providers SECURELY PROVISION PROTECT AND DEFEND OPERATE AND MAINTAIN OVERSEE AND GOVERN COLLECT AND OPERATE INVESTIGATEANALYZE
  • 9. Securely Provision (7 Specialty Areas, 11 Work Roles) 9 Category Specialty Area Work Role Securely Provision Risk Management Authorizing Official/Designating Representative Security Control Assessor Software Development Software Developer Secure Software Assessor Systems Architecture Enterprise Architect Security Architect Technology R&D Research & Development Specialist Systems Requirements Planning Systems Requirements Planner Test and Evaluation Testing and Evaluation Specialist Systems Development Information Systems Security Developer Systems Developer
  • 10. Operate and Maintain (6 Specialty Areas, 7 Work Roles) 10 Category Specialty Area Work Role Operate and Maintain Data Administration Database Administrator Data Analyst Knowledge Management Knowledge Manager Customer Service and Technical Support Technical Support Specialist Network Services Network Operations Specialist Systems Administration System Administrator Systems Analysis Systems Security Analyst
  • 11. Oversee and Govern (6 Specialty Areas, 14 Work Roles) 11 Category Specialty Area Work Role Oversee and Govern Legal Advice and Advocacy Cyber Legal Advisor Privacy Compliance Manager Training, Education, and Awareness Cyber Instructional Curriculum Developer Cyber Instructor Cybersecurity Management Information Systems Security Manager COMSEC Manager Strategic Planning and Policy Cyber Workforce Developer and Manager Cyber Policy and Strategy Planner Executive Cyber Leadership Executive Cyber Leadership Acquisition and Program/Project Management Program Manager IT Project Manager Product Support Manager IT Investment/Portfolio Manager IT Program Auditor
  • 12. Protect and Defend (4 Specialty Areas, 4 Work Roles) 12 Category Specialty Area Work Role Protect and Defend Cyber Defense Analysis Cyber Defense Analyst Cyber Defense Infrastructure Support Cyber Defense Infrastructure Support Specialist Incident Response Cyber Defense Incident Responder Vulnerability Assessment and Management Vulnerability Assessment Analyst
  • 13. Analyze (5 Specialty Areas, 7 Work Roles) 13 Category Specialty Area Work Role Analyze Threat Analysis Warning Analyst Exploitation Analysis Exploitation Analyst All-Source Analysis All-Source Analyst Mission Assessment Specialist Targets Target Developer Target Network Analyst Language Analysis Multi-Disciplined Language Analyst
  • 14. Operate and Collect (3 Specialty Areas, 6 Work Roles) 14 Category Specialty Area Work Role Collect and Operate Collection Operations All Source-Collection Manager All Source-Collection Requirements Manager Cyber Operational Planning Cyber Intel Planner Cyber Ops Planner Partner Integration Planner Cyber Operations Cyber Operator
  • 15. Investigate (2 Specialty Areas, 3 Work Roles) 15 Category Specialty Area Work Role Investigate Cyber Investigation Cyber Crime Investigator Digital Forensics Forensics Analyst Cyber Defense Forensics Analyst
  • 16. 16 Support employers to address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent Objectives: 3.1 Identify and analyze data sources that support projecting present and future demand and supply of qualified cybersecurity workers 3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage adoption 3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce needs 3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring, development, and retention of cybersecurity professionals 3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce planning NICE Strategic Goal #3: Guide Career Development and Workforce Planning
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. Enabling the Cybersecurity Workforce of Tomorrow The NICE Challenge Project was created to develop virtual challenges and environments to evaluate students and professionals alike on their ability to perform NICE Cybersecurity Workforce Framework tasks and exhibit their knowledge, skills, and abilities. Whether it’s supporting the teaching of competencies to students or evaluating the competencies of professionals, we’ve got you covered.
  • 25. NICE Challenge Project Building Blocks Platform  We run & host the hardware, no upfront investment required • Powerful & highly accessible web interface, no installs required • Enables specialized content development, deployment, & analysis Environments • Full scale context rich environments inspired by NICE Cybersecurity Workforce Framework Categories • Fictional organizations & employees • Virtualized networks, servers, & employee desktops Challenges • Competency based assessments focused on real world problems & context • Maps to NICE Cybersecurity Workforce Framework Tasks/KSAs & CAE KUs • Designed to capture useful data for actionable metrics & analytics
  • 26. 26 Support employers to address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent Objectives: 3.1 Identify and analyze data sources that support projecting present and future demand and supply of qualified cybersecurity workers 3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage adoption 3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce needs 3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring, development, and retention of cybersecurity professionals 3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce planning NICE Strategic Goal #3: Guide Career Development and Workforce Planning
  • 27. Regional Alliances & Multistakeholder Partnerships • RAMPS for Cybersecurity Education & Workforce • Job-Driven Training Principles  Engaging Employers  Earn and Learn  Smart Choices  Measuring Matters  Stepping Stones  Opening Doors  Regional Partnerships 27
  • 29. RAMPS Communities Southwest Region: Arizona Statewide Cyber Workforce Consortium Western Region: Cyber Prep Program Central Region: Cincinnati-Dayton Cyber Corridor (Cin-Day Cyber) Mid-Atlantic Region: Hampton Roads Cybersecurity Education, Workforce, and Economic Development Alliance (HRCyber) Northeast Region: The Partnership to Advance Cybersecurity Education and Training (PACET) 29
  • 30. Examples of Affiliated Programs • DHS/NSA Centers of Academic Excellence in Cybersecurity – 2Y, Cyber Defense Ed, Research • NSA Centers of Academic Excellence in Cyber Operations • NSF Advanced Technological Education Centers • CyberCorps: Scholarship for Service Program • GenCyber Summer Camps • And more . . . 30
  • 31. Centers of Academic Excellence in Cybersecurity 31
  • 32. Roadmap to Growing and Sustaining Workforce Community-Oriented Employer-Led Learner-Centered Standards-Based Outcomes-Driven 32
  • 33. Cybersecurity Executive Order Cybersecurity for the Nation: Policy To ensure that the internet remains valuable for future generations, it is the policy of the executive branch to promote an open, interoperable, reliable, and secure internet that fosters efficiency, innovation, communication, and economic prosperity, while respecting privacy and guarding against disruption, fraud, and theft. Further, the United States seeks to support the growth and sustainment of a workforce that is skilled in cybersecurity and related fields as the foundation for achieving our objectives in cyberspace. 33
  • 34. Workforce Development Provision Purpose: In order to ensure that the United States maintains a long-term cybersecurity advantage . . . Three Deliverables: • Growing and Sustaining the Cybersecurity Workforce • International Competiveness • National Security Advantage Website: nist.gov/nice/cybersecurityworkforce 34
  • 35. Public and Private Sector Workforce • Assess the scope and sufficiency of efforts to educate and train the American cybersecurity workforce of the future, including cybersecurity- related education curricula, training, and apprenticeship programs, from primary through higher education • Provide a report to the President within 120 days with findings and recommendations regarding how to support the growth and sustainment of the Nation's cybersecurity workforce in both the public and private sectors. 35
  • 36. NICE Engagement Process • NICE Working Group Subgroups: K-12, Collegiate, Competitions, Training and Certifications, and Workforce Management • NICE Interagency Coordinating Council • NICE Webinars (Monthly) • NICE eNewsletter (Quarterly) • NICE Email Updates (Periodic) • NICE Events Annual Conference & Expo: November 7-8, 2017, Dayton, OH NICE K-12 Cybersecurity Education Conference: Dec 3-4, Nashville, TN • NICE Website: nist.gov/nice 36

Editor's Notes

  1. Let’s talk more about what the Workforce Framework is: The National Cybersecurity Workforce Framework (Workforce Framework) is a national resource that categorizes, organizes, and describes cybersecurity work. It provide educators, students, employers, employees, training providers and policy makers with a national standard for organizing the way we define and talk about cybersecurity work, and what is required to do that work. It identifies the tasks (or activities) performed to carry out cybersecurity work across over 30 Specialty Areas, as well as the requisite knowledge skills, and abilities. As more organizations align their workforce development efforts the Workforce Framework, our Nation will have a more standardized cybersecurity workforce that more effectively secures our networks.