Rodney Petersen, Director of the National Initiative for Cybersecurity Education (NICE), which is a part of the US Department of Commerce, presented at the TALK Cybersecurity Summit 2017.
Rachel Adamick has over 6 years of experience in cyber security and computer networking. She has held positions as a Cyber Training Developer, Cyber Security Intelligence Analyst Trainer and Mentor for the U.S. Navy, Intrusion Set Analyst, and Network Information Exploitation Analyst. Her experience includes developing cyber security training courses, analyzing digital media and networks, and providing expertise to the U.S. Navy and other organizations. She has a high school diploma and military certifications including Net+ and Sec+.
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
This document provides a summary of Bob Turner's cybersecurity strategic plan briefing to the Information Technology Committee. The strategic plan aims to improve cybersecurity at UW-Madison through establishing a risk management framework, promoting cyber hygiene, facilitating incident response, and consolidating incident response capabilities. The plan aligns with UW-Madison's strategic priorities of education, research, community engagement, diversity, and resource stewardship. Key elements of the cybersecurity strategy include implementing data governance, establishing a risk management framework, improving user competence through training, consolidating security operations, enhancing threat intelligence, and establishing collaborative partnerships. The roadmap provided outlines the review and socialization process for the strategic plan.
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
DHS Cybersecurity Analyst details the US Department of Homeland Security Services for all businesses to build cyber resilience at the Technology Association of Louisville's CyberSecurity Summit on June 14, 2019.
Rural Info Tech Alliance: Growing and Keeping IT TalentAnn Treacy
The Rural Information Technology Alliance (RITA) is a consortium of four community colleges funded by a $18 million Department of Labor grant to develop IT training programs to meet the needs of rural communities. RITA aims to increase enrollment in its programs through innovative curriculum, support services, and partnerships with local employers. It has ambitious goals to serve over 1,000 students, help over 600 complete credentials, and place over 600 in jobs or with increased wages by the end of the grant period in 2017.
The document provides an overview of designing and developing an effective security awareness and training program. It defines security awareness training, discusses why such programs are important, and outlines best practices for doing it correctly. The presentation agenda includes defining security awareness training, discussing its importance, and presenting Mittal Technologies' security awareness training solution. The document then provides details on developing effective security awareness training, including establishing goals and success criteria, designing the program, developing training content at different levels, and tracking results.
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
A CSIRT and SOC provide cyber security incident response and monitoring. A CSIRT handles incidents like malware, DDoS attacks, and data breaches, while a SOC proactively monitors networks for threats. Best practices for establishing these teams include obtaining management support, developing strategic plans, designing team structures, implementing capabilities, and evaluating effectiveness. Key roles for a SOC include prevention, detection, analysis, response, and reporting on security issues.
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...JISC RSC Eastern
The document discusses the importance of digital literacy for students to be prepared for further education, higher education, and the workplace, where 90% of new jobs will require excellent digital skills. It emphasizes that courses should embed both core digital skills and subject-specific technology use to enable students to gain skills and confidence using digital tools for learning and employment. The Jisc Developing Digital Literacies Programme aims to help educational institutions improve students' digital literacies through organizational reviews, staff development, and signposting to relevant research.
"How You Can Participate in TALK's KY Cybersecurity Enclave for Regional and National Attack Views & Reporting," Phil Bond, CEO of CyberUSA, with Q&A, including Dawn Yankeelov, Executive Director, TALK.
Rachel Adamick has over 6 years of experience in cyber security and computer networking. She has held positions as a Cyber Training Developer, Cyber Security Intelligence Analyst Trainer and Mentor for the U.S. Navy, Intrusion Set Analyst, and Network Information Exploitation Analyst. Her experience includes developing cyber security training courses, analyzing digital media and networks, and providing expertise to the U.S. Navy and other organizations. She has a high school diploma and military certifications including Net+ and Sec+.
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
This document provides a summary of Bob Turner's cybersecurity strategic plan briefing to the Information Technology Committee. The strategic plan aims to improve cybersecurity at UW-Madison through establishing a risk management framework, promoting cyber hygiene, facilitating incident response, and consolidating incident response capabilities. The plan aligns with UW-Madison's strategic priorities of education, research, community engagement, diversity, and resource stewardship. Key elements of the cybersecurity strategy include implementing data governance, establishing a risk management framework, improving user competence through training, consolidating security operations, enhancing threat intelligence, and establishing collaborative partnerships. The roadmap provided outlines the review and socialization process for the strategic plan.
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
DHS Cybersecurity Analyst details the US Department of Homeland Security Services for all businesses to build cyber resilience at the Technology Association of Louisville's CyberSecurity Summit on June 14, 2019.
Rural Info Tech Alliance: Growing and Keeping IT TalentAnn Treacy
The Rural Information Technology Alliance (RITA) is a consortium of four community colleges funded by a $18 million Department of Labor grant to develop IT training programs to meet the needs of rural communities. RITA aims to increase enrollment in its programs through innovative curriculum, support services, and partnerships with local employers. It has ambitious goals to serve over 1,000 students, help over 600 complete credentials, and place over 600 in jobs or with increased wages by the end of the grant period in 2017.
The document provides an overview of designing and developing an effective security awareness and training program. It defines security awareness training, discusses why such programs are important, and outlines best practices for doing it correctly. The presentation agenda includes defining security awareness training, discussing its importance, and presenting Mittal Technologies' security awareness training solution. The document then provides details on developing effective security awareness training, including establishing goals and success criteria, designing the program, developing training content at different levels, and tracking results.
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
A CSIRT and SOC provide cyber security incident response and monitoring. A CSIRT handles incidents like malware, DDoS attacks, and data breaches, while a SOC proactively monitors networks for threats. Best practices for establishing these teams include obtaining management support, developing strategic plans, designing team structures, implementing capabilities, and evaluating effectiveness. Key roles for a SOC include prevention, detection, analysis, response, and reporting on security issues.
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...JISC RSC Eastern
The document discusses the importance of digital literacy for students to be prepared for further education, higher education, and the workplace, where 90% of new jobs will require excellent digital skills. It emphasizes that courses should embed both core digital skills and subject-specific technology use to enable students to gain skills and confidence using digital tools for learning and employment. The Jisc Developing Digital Literacies Programme aims to help educational institutions improve students' digital literacies through organizational reviews, staff development, and signposting to relevant research.
"How You Can Participate in TALK's KY Cybersecurity Enclave for Regional and National Attack Views & Reporting," Phil Bond, CEO of CyberUSA, with Q&A, including Dawn Yankeelov, Executive Director, TALK.
Want to learn about the latest NIST Cybersecurity Framework (CSF) 2.0?
We've just uploaded a recording of our 2-hour training workshop organized by the ISC2 El Djazair Chapter and delivered by cybersecurity instructor Bachir Benyammi.
In this workshop, you'll gain insights on:
- NIST CSF 2.0 components (Core, Tiers, and Profiles)
- Implementing the framework for your specific needs
- Improving your organization's cybersecurity posture
- Assessing your cybersecurity maturity
- Examples of assessment tools
Watch the full workshop on our YouTube channel: https://lnkd.in/dXEbp8QM
Presentation for March 2017 webcast by NIST.
www.nist.gov/cyberframework
Webcast video: https://www.nist.gov/news-events/events/2017/03/cybersecurity-framework-virtual-events
This presentation introduces the audience to the Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”). It provides a brief history about why and how the Framework was developed, and an understanding of each of the three primary Framework components (the Core, Implementation Tiers, and Profiles). It covers potential benefits of Framework, and how the Framework can be used. It highlights industry resources, progress in Roadmap areas, and future direction of the Framework program.
As attacks have become more sophisticated, the need for Computer Security Incident Response Teams (CSIRTs) has grown to address challenges like botnets, distributed denial-of-service (DDoS) attacks, insider threats, and advanced persistent threats (APTs). The presentation discusses best practices for creating a CSIRT, including obtaining management support, determining a strategic plan, designing a vision, implementation, and evaluating effectiveness. It also covers Security Operations Centers (SOCs), their mission to prevent, monitor, detect, respond to, and report on cybersecurity incidents, and best practices for establishing an SOC.
This document provides an overview of reducing cybersecurity risks for business leaders. It discusses the growing threat of cyber attacks and how attackers' motives include espionage, financial gain, and disruption. The document recommends starting with behaviors to reduce risk, such as training employees and installing software patches. It also suggests implementing two-factor authentication, intrusion detection, and incident response plans. The document references frameworks for covering all cybersecurity specialties and provides examples of questions board members may ask about an organization's cybersecurity program.
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
This document provides information about the Regional Cyber Security Summit 2016 happening from May 11-13 in Nairobi, Kenya. The summit will discuss securing enterprises in today's connected world and ensuring business continuity in the face of human, organizational, and governance factors related to cybersecurity.
Over the three days, expert speakers will lead discussions on best practices in cybersecurity management and key issues like the skills gap in Africa, virtualization security, the internet of things risks, and using data analytics for cyber intelligence. Attendees will include CISOs, CIOs, and other IT security professionals. The goal is information sharing across the region to help organizations improve their cybersecurity posture through better funding, skills, and awareness of
With increased use of technology in all aspects of our
lives, the need to protect our computers, networks, and
data increases as well. In the United States alone, there
are 400,000 unfilled jobs in the field of cyber-security.
You’ll learn what training programs exist and how
major corporations are committing to cyber-security
education. We’ll discuss how Rotarians can work to
connect underserved communities with training and job
opportunities both locally and internationally.
Hashem Mohammad Salem Al Widyan is a 61-year-old Jordanian male who is married and fluent in Arabic and English. He has a B.Sc. in Electrical and Telecommunications Engineering from the University of Southwestern Louisiana at Lafayette as well as a PMP Diploma. Al Widyan has worked as a freelance trainer and consultant since 2009, training engineers from several countries in project management, feasibility studies, quality management, and software like Primavera and Microsoft Project. Prior to his current role, he served in the Jordanian Army from 1986 to 2009 where he managed and supervised various projects and conducted research related to information technology, resource management, and national security.
Marlabs helps establish and sustain the client’s company wide vision for cyber security strategies for addressing regulations, audit, and security risks.
The document discusses the five functions of the Cybersecurity Framework - Identify, Protect, Detect, Respond, and Recover. It provides examples of outcomes for each function, such as identifying physical and software assets for the Identify function, establishing data security protections for the Protect function, implementing security continuous monitoring capabilities for the Detect function, ensuring response planning processes are executed for the Respond function, and maintaining recovery planning processes for the Recover function. The five functions represent the key pillars of a successful cybersecurity program and aid organizations in expressing how they manage cybersecurity risk at a high level.
Our SOC Analyst Training in Hyderabad is designed to teach you how to protect computer systems and networks from cyber threats. You'll learn about different types of attacks like viruses, hackers, and phishing scams. We'll show you how to use tools like firewalls and antivirus software to keep systems safe. With hands-on training, you'll practice what you learn in real-life situations. By the end of the course, you'll be ready to identify and respond to security incidents, making you a valuable asset to any organization's cybersecurity team. Join us and become a skilled SOC analyst!
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...Sandra Gesing
Science gateways - also called virtual research environments or virtual labs - allow science and engineering communities to access shared data, software, computing services, instruments, and other resources specific to their disciplines and use them also in teaching environments. In the last decade mature complete science gateway frameworks have evolved such as HUBzero and Galaxy as well as Agave and Apache Airavata. Successful implementations have been adapted for several science gateways, for example, the technologies behind the science gateways CIPRES, which is used by over 20.000 users to date and serves the community in the area of large phylogenetic trees. Lessons learned from the last decade include that approaches should be technology agnostic, use standard web technologies or deliver a complete solution. Independent of the technology, the major driver for science gateways are the user communities and user engagement is key for successful science gateways. The US Science Gateways Community Institute (SGCI), opened in August 2016, provides free resources, services, experts, and ideas for creating and sustaining science gateways. It offers five areas of services to the science gateway developer and user communities: the Incubator, Extended Developer Support, the Scientific Software Collaborative, Community Engagement and Exchange, and Workforce Development. The talk will give an introduction to science gateways, examples for science gateways and an overview on the services offered by the SGCI to serve user communities and developers for creating successful science gateways.
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxAbid Ur Rehman
This document discusses cybersecurity services based on the NIST Cybersecurity Framework (NIST CSF). It begins by discussing the digital innovation economy and the need for effective cybersecurity. It then covers the cybersecurity problem in terms of managing risk through understanding threats, vulnerabilities, assets, and controls. The NIST CSF is introduced as a voluntary framework to manage cybersecurity risk. The document outlines the technical and business controls in the NIST CSF and how they map to standards like CIS Critical Security Controls and ISO 27002. It introduces UMass' "Controls Factory" approach to operationalizing the NIST CSF across an enterprise and supply chain. Finally, it discusses the cybersecurity services UMass offers based on the NIST CSF, including
Build an Information Security StrategyAndrew Byers
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
Tamer Shams EL-dean Sayed is an Egyptian IT Project Manager seeking a challenging position. He has a Master's degree in storage works solution and a Bachelor's degree in Communication and Electronics Engineering. He has over 10 years of experience as an IT Project Manager and Network Administrator in Saudi Arabia. He is proficient in technical management, problem solving, and communication skills.
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...Infosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/nice-cybersecurity-workforce-framework/
The demand for skilled cybersecurity professionals continues to grow, and effectively closing that gap requires a shared set of expectations around common work roles, core competency areas and upskilling employees.
Join Leo Van Duyn, Cybersecurity & Technology Workforce Development Strategy at JPMorgan Chase & Co., and Bill Newhouse, Deputy Director of the National Initiative for Cybersecurity Education (NICE) in this on-demand webinar to learn how your organization can use the NICE Cybersecurity Workforce Framework to:
- Establish a common language around skill development
- Provide targeted, role-based training with competencies and KSAs
- Create custom role profiles to match your organization
- Better identify, hire and cross-train employees
CRISC certification at InfosecTrain prepares IT professionals for enterprise risk management’s unique challenges. The training program enables them to become strategic partners to the enterprise.
CRISC certification at InfosecTrain prepares IT professionals for enterprise risk management’s unique challenges. The training program enables them to become strategic partners to the enterprise.
CRISC is the most current and rigorous assessment available to evaluate IT professionals’ risk management proficiency and other employees within an enterprise or financial institute.
This public policy session on the activities of the Technology Association of Louisville Kentucky (TALK) was presented in June 2022 at the TALK Cyber Security Summit in Louisville, KY.
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021Dawn Yankeelov
Dawn Yankeelov, a cyber policy leader in Kentucky, speaks to the changing landscape for banking cybersecurity policy for a SecuretheVillage workgroup in the Summer of 2021.
More Related Content
Similar to Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017
Want to learn about the latest NIST Cybersecurity Framework (CSF) 2.0?
We've just uploaded a recording of our 2-hour training workshop organized by the ISC2 El Djazair Chapter and delivered by cybersecurity instructor Bachir Benyammi.
In this workshop, you'll gain insights on:
- NIST CSF 2.0 components (Core, Tiers, and Profiles)
- Implementing the framework for your specific needs
- Improving your organization's cybersecurity posture
- Assessing your cybersecurity maturity
- Examples of assessment tools
Watch the full workshop on our YouTube channel: https://lnkd.in/dXEbp8QM
Presentation for March 2017 webcast by NIST.
www.nist.gov/cyberframework
Webcast video: https://www.nist.gov/news-events/events/2017/03/cybersecurity-framework-virtual-events
This presentation introduces the audience to the Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”). It provides a brief history about why and how the Framework was developed, and an understanding of each of the three primary Framework components (the Core, Implementation Tiers, and Profiles). It covers potential benefits of Framework, and how the Framework can be used. It highlights industry resources, progress in Roadmap areas, and future direction of the Framework program.
As attacks have become more sophisticated, the need for Computer Security Incident Response Teams (CSIRTs) has grown to address challenges like botnets, distributed denial-of-service (DDoS) attacks, insider threats, and advanced persistent threats (APTs). The presentation discusses best practices for creating a CSIRT, including obtaining management support, determining a strategic plan, designing a vision, implementation, and evaluating effectiveness. It also covers Security Operations Centers (SOCs), their mission to prevent, monitor, detect, respond to, and report on cybersecurity incidents, and best practices for establishing an SOC.
This document provides an overview of reducing cybersecurity risks for business leaders. It discusses the growing threat of cyber attacks and how attackers' motives include espionage, financial gain, and disruption. The document recommends starting with behaviors to reduce risk, such as training employees and installing software patches. It also suggests implementing two-factor authentication, intrusion detection, and incident response plans. The document references frameworks for covering all cybersecurity specialties and provides examples of questions board members may ask about an organization's cybersecurity program.
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
This document provides information about the Regional Cyber Security Summit 2016 happening from May 11-13 in Nairobi, Kenya. The summit will discuss securing enterprises in today's connected world and ensuring business continuity in the face of human, organizational, and governance factors related to cybersecurity.
Over the three days, expert speakers will lead discussions on best practices in cybersecurity management and key issues like the skills gap in Africa, virtualization security, the internet of things risks, and using data analytics for cyber intelligence. Attendees will include CISOs, CIOs, and other IT security professionals. The goal is information sharing across the region to help organizations improve their cybersecurity posture through better funding, skills, and awareness of
With increased use of technology in all aspects of our
lives, the need to protect our computers, networks, and
data increases as well. In the United States alone, there
are 400,000 unfilled jobs in the field of cyber-security.
You’ll learn what training programs exist and how
major corporations are committing to cyber-security
education. We’ll discuss how Rotarians can work to
connect underserved communities with training and job
opportunities both locally and internationally.
Hashem Mohammad Salem Al Widyan is a 61-year-old Jordanian male who is married and fluent in Arabic and English. He has a B.Sc. in Electrical and Telecommunications Engineering from the University of Southwestern Louisiana at Lafayette as well as a PMP Diploma. Al Widyan has worked as a freelance trainer and consultant since 2009, training engineers from several countries in project management, feasibility studies, quality management, and software like Primavera and Microsoft Project. Prior to his current role, he served in the Jordanian Army from 1986 to 2009 where he managed and supervised various projects and conducted research related to information technology, resource management, and national security.
Marlabs helps establish and sustain the client’s company wide vision for cyber security strategies for addressing regulations, audit, and security risks.
The document discusses the five functions of the Cybersecurity Framework - Identify, Protect, Detect, Respond, and Recover. It provides examples of outcomes for each function, such as identifying physical and software assets for the Identify function, establishing data security protections for the Protect function, implementing security continuous monitoring capabilities for the Detect function, ensuring response planning processes are executed for the Respond function, and maintaining recovery planning processes for the Recover function. The five functions represent the key pillars of a successful cybersecurity program and aid organizations in expressing how they manage cybersecurity risk at a high level.
Our SOC Analyst Training in Hyderabad is designed to teach you how to protect computer systems and networks from cyber threats. You'll learn about different types of attacks like viruses, hackers, and phishing scams. We'll show you how to use tools like firewalls and antivirus software to keep systems safe. With hands-on training, you'll practice what you learn in real-life situations. By the end of the course, you'll be ready to identify and respond to security incidents, making you a valuable asset to any organization's cybersecurity team. Join us and become a skilled SOC analyst!
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...Sandra Gesing
Science gateways - also called virtual research environments or virtual labs - allow science and engineering communities to access shared data, software, computing services, instruments, and other resources specific to their disciplines and use them also in teaching environments. In the last decade mature complete science gateway frameworks have evolved such as HUBzero and Galaxy as well as Agave and Apache Airavata. Successful implementations have been adapted for several science gateways, for example, the technologies behind the science gateways CIPRES, which is used by over 20.000 users to date and serves the community in the area of large phylogenetic trees. Lessons learned from the last decade include that approaches should be technology agnostic, use standard web technologies or deliver a complete solution. Independent of the technology, the major driver for science gateways are the user communities and user engagement is key for successful science gateways. The US Science Gateways Community Institute (SGCI), opened in August 2016, provides free resources, services, experts, and ideas for creating and sustaining science gateways. It offers five areas of services to the science gateway developer and user communities: the Incubator, Extended Developer Support, the Scientific Software Collaborative, Community Engagement and Exchange, and Workforce Development. The talk will give an introduction to science gateways, examples for science gateways and an overview on the services offered by the SGCI to serve user communities and developers for creating successful science gateways.
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxAbid Ur Rehman
This document discusses cybersecurity services based on the NIST Cybersecurity Framework (NIST CSF). It begins by discussing the digital innovation economy and the need for effective cybersecurity. It then covers the cybersecurity problem in terms of managing risk through understanding threats, vulnerabilities, assets, and controls. The NIST CSF is introduced as a voluntary framework to manage cybersecurity risk. The document outlines the technical and business controls in the NIST CSF and how they map to standards like CIS Critical Security Controls and ISO 27002. It introduces UMass' "Controls Factory" approach to operationalizing the NIST CSF across an enterprise and supply chain. Finally, it discusses the cybersecurity services UMass offers based on the NIST CSF, including
Build an Information Security StrategyAndrew Byers
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
Tamer Shams EL-dean Sayed is an Egyptian IT Project Manager seeking a challenging position. He has a Master's degree in storage works solution and a Bachelor's degree in Communication and Electronics Engineering. He has over 10 years of experience as an IT Project Manager and Network Administrator in Saudi Arabia. He is proficient in technical management, problem solving, and communication skills.
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...Infosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/nice-cybersecurity-workforce-framework/
The demand for skilled cybersecurity professionals continues to grow, and effectively closing that gap requires a shared set of expectations around common work roles, core competency areas and upskilling employees.
Join Leo Van Duyn, Cybersecurity & Technology Workforce Development Strategy at JPMorgan Chase & Co., and Bill Newhouse, Deputy Director of the National Initiative for Cybersecurity Education (NICE) in this on-demand webinar to learn how your organization can use the NICE Cybersecurity Workforce Framework to:
- Establish a common language around skill development
- Provide targeted, role-based training with competencies and KSAs
- Create custom role profiles to match your organization
- Better identify, hire and cross-train employees
CRISC certification at InfosecTrain prepares IT professionals for enterprise risk management’s unique challenges. The training program enables them to become strategic partners to the enterprise.
CRISC certification at InfosecTrain prepares IT professionals for enterprise risk management’s unique challenges. The training program enables them to become strategic partners to the enterprise.
CRISC is the most current and rigorous assessment available to evaluate IT professionals’ risk management proficiency and other employees within an enterprise or financial institute.
Similar to Rodney Petersen's KEYNOTE at the TALK Cybersecurity Summit 2017 (20)
This public policy session on the activities of the Technology Association of Louisville Kentucky (TALK) was presented in June 2022 at the TALK Cyber Security Summit in Louisville, KY.
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021Dawn Yankeelov
Dawn Yankeelov, a cyber policy leader in Kentucky, speaks to the changing landscape for banking cybersecurity policy for a SecuretheVillage workgroup in the Summer of 2021.
A conversation on guidance and liabilities regarding reopening KY with Frost Brown Todd Attorney Victor Beckman and the Technology Association of Louisville KY's Executive Director Dawn Yankeelov.
Cyber Security Threats Facing Small Businesses--June 2019Dawn Yankeelov
This presentation was made by Cloudnexus Founder Jay Rollins at the Technology Association of Louisville Kentucky's Cybersecurity Summit on June 14, 2019.
This presentation was given by Security Analyst Josh Chou from Cybereason on June 14, 2019 at the Technology Association of Louisville Kentucky's Cybersecurity Summit.
Cyber Security Resilience from Metro Louisville Govt. Dawn Yankeelov
Metro Louisville's Chief Security Officer James Meece spoke at the Technology Association of Louisville Kentucky's CyberSecurity Summit 2019 in June on Cyber Resilience.
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachDawn Yankeelov
The document summarizes legal issues related to data privacy and security breaches. It discusses (1) the relevant cost-benefit analysis that courts consider for data security, (2) examples of court orders regarding document productions and computer forensics in litigation, and (3) that parties are responsible for errors made by their vendors. The document then provides an agenda on legal issues in data privacy and security, including anticipating threats, incident response, and applying relevant laws and frameworks.
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
"Understanding Cyber Industrial Controls in the Manufacturing and Utilities Environment," By Dr. John Naber, Co-Founder & Partner in True Secure SCADA, which is KY-based and holds 2 key patents in this area. This was given at the TALK Cybersecurity Summit 2018 in Louisville, KY.
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisDawn Yankeelov
These slides by Scott U'Sellis of the Kentucky Department of Education, Office of Career and Technical Education, were presented at Techfest Louisville 2017 hosted by the Technology Association of Louisville Kentucky.
This presentation was made on PSST's approach to building the company at Techfest Louisville 2017, hosted by the Technology Association of Louisville Kentucky.
Entrepreneur John Wiliamson presented RCM Brain: AI Bots in Healthcare at Techfest Louisville 2017 hosted by TALK, the Technology Association of Louisville Kentucky.
Cybersecurity Trends & Startups by Gula Tech AdventuresDawn Yankeelov
This presentation was made by Cybersecurity Expert and Investor Ron Gula at Techfest Louisville 2017, hosted by TALK, the Technology Association of Louisville Kentucky.
Derek Rush of LBMC Information Security presented at Techfest Louisville 2017 which was hosted by the Technology Association of Louisville Kentucky (TALK.)
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Dawn Yankeelov
Blackline Advisory Group ran the panel discussion on Blockchain at the Techfest Louisville 2017 event hosted by TALK, the Technology Association of Louisville Kentucky.
Espoo Innovation Garden: Open Innovation Works for YouDawn Yankeelov
This presentation was made at Techfest Louisville 2017 hosted by TALK. The speaker was Ari Huczkowski from Finland who is the evangelist for Northern Europe's largest innovation hub.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
3. Mission of NICE
To energize and promote a robust network and
an ecosystem of cybersecurity education,
training, and workforce development.
3
4. Accelerate Learning and Skills Development
Inspire a sense of urgency
in both the public and
private sectors to address
the shortage of skilled
cybersecurity workers
4
5. Nurture A Diverse Learning Community
Strengthen education and
training across the ecosystem
to emphasize learning,
measure outcomes, and
diversify the cybersecurity
workforce
5
6. Guide Career Development & Workforce Planning
Support employers to
address market demands
and enhance recruitment,
hiring, development, and
retention of cybersecurity
talent
6
7. 7
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present and future demand and supply of
qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce
Framework and encourage adoption
3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce
needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
8. NICE Cybersecurity Workforce Framework – Draft NIST SP 800-181
Reference Resource for cybersecurity workforce development
• Specialty Areas (33) – Distinct areas of cybersecurity work;
• Work Roles (52) – The most detailed groupings of IT, cybersecurity or cyber-related work,
which include specific knowledge, skills, and abilities required to perform a set of tasks.
• Tasks – Specific work activities that could be assigned to a professional working in one of
the NCWF’s Work Roles; and,
• Knowledge, Skills, and Abilities (KSAs) –
• Attributes required to perform Tasks, generally
demonstrated through relevant experience
or performance-based education and training.
• Audience:
• Employers
• Current and Future Cybersecurity Workers
• Training and Certification Providers
• Education Providers
• Technology Providers
SECURELY
PROVISION
PROTECT
AND
DEFEND
OPERATE
AND
MAINTAIN
OVERSEE
AND
GOVERN
COLLECT
AND
OPERATE
INVESTIGATEANALYZE
9. Securely Provision (7 Specialty Areas, 11 Work Roles)
9
Category Specialty Area Work Role
Securely
Provision
Risk Management
Authorizing Official/Designating Representative
Security Control Assessor
Software Development
Software Developer
Secure Software Assessor
Systems Architecture
Enterprise Architect
Security Architect
Technology R&D Research & Development Specialist
Systems Requirements
Planning
Systems Requirements Planner
Test and Evaluation Testing and Evaluation Specialist
Systems Development
Information Systems Security Developer
Systems Developer
10. Operate and Maintain (6 Specialty Areas, 7 Work Roles)
10
Category Specialty Area Work Role
Operate and
Maintain
Data Administration
Database Administrator
Data Analyst
Knowledge Management Knowledge Manager
Customer Service and
Technical Support
Technical Support Specialist
Network Services Network Operations Specialist
Systems Administration System Administrator
Systems Analysis Systems Security Analyst
11. Oversee and Govern (6 Specialty Areas, 14 Work Roles)
11
Category Specialty Area Work Role
Oversee
and Govern
Legal Advice and Advocacy
Cyber Legal Advisor
Privacy Compliance Manager
Training, Education, and
Awareness
Cyber Instructional Curriculum Developer
Cyber Instructor
Cybersecurity Management
Information Systems Security Manager
COMSEC Manager
Strategic Planning and Policy
Cyber Workforce Developer and Manager
Cyber Policy and Strategy Planner
Executive Cyber Leadership Executive Cyber Leadership
Acquisition and
Program/Project
Management
Program Manager
IT Project Manager
Product Support Manager
IT Investment/Portfolio Manager
IT Program Auditor
12. Protect and Defend (4 Specialty Areas, 4 Work Roles)
12
Category Specialty Area Work Role
Protect and
Defend
Cyber Defense Analysis Cyber Defense Analyst
Cyber Defense Infrastructure
Support
Cyber Defense Infrastructure Support Specialist
Incident Response Cyber Defense Incident Responder
Vulnerability Assessment and
Management
Vulnerability Assessment Analyst
13. Analyze (5 Specialty Areas, 7 Work Roles)
13
Category Specialty Area Work Role
Analyze
Threat Analysis Warning Analyst
Exploitation Analysis Exploitation Analyst
All-Source Analysis
All-Source Analyst
Mission Assessment Specialist
Targets
Target Developer
Target Network Analyst
Language Analysis Multi-Disciplined Language Analyst
14. Operate and Collect (3 Specialty Areas, 6 Work Roles)
14
Category Specialty Area Work Role
Collect and
Operate
Collection Operations
All Source-Collection Manager
All Source-Collection Requirements Manager
Cyber Operational Planning
Cyber Intel Planner
Cyber Ops Planner
Partner Integration Planner
Cyber Operations Cyber Operator
15. Investigate (2 Specialty Areas, 3 Work Roles)
15
Category Specialty Area Work Role
Investigate
Cyber Investigation Cyber Crime Investigator
Digital Forensics
Forensics Analyst
Cyber Defense Forensics Analyst
16. 16
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present
and future demand and supply of qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage
adoption
3.3 Facilitate state and regional consortia to identify cybersecurity pathways addressing local workforce
needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
24. Enabling the Cybersecurity Workforce of Tomorrow
The NICE Challenge Project was created to develop virtual
challenges and environments to evaluate students and
professionals alike on their ability to perform NICE
Cybersecurity Workforce Framework tasks and exhibit their
knowledge, skills, and abilities. Whether it’s supporting the
teaching of competencies to students or evaluating the
competencies of professionals, we’ve got you covered.
25. NICE Challenge Project Building Blocks
Platform
We run & host the hardware, no
upfront investment required
• Powerful & highly accessible web
interface, no installs required
• Enables specialized content
development, deployment, &
analysis
Environments
• Full scale context rich
environments inspired by NICE
Cybersecurity Workforce
Framework Categories
• Fictional organizations &
employees
• Virtualized networks, servers, &
employee desktops
Challenges
• Competency based assessments
focused on real world problems &
context
• Maps to NICE Cybersecurity
Workforce Framework Tasks/KSAs
& CAE KUs
• Designed to capture useful data
for actionable metrics & analytics
26. 26
Support employers to address market demands and enhance recruitment, hiring,
development, and retention of cybersecurity talent
Objectives:
3.1 Identify and analyze data sources that support projecting present and future demand and supply of
qualified cybersecurity workers
3.2 Publish and raise awareness of the NICE Cybersecurity Workforce Framework and encourage
adoption
3.3 Facilitate state and regional consortia to identify cybersecurity
pathways addressing local workforce needs
3.4 Promote tools that assist human resource professionals and hiring managers with recruitment, hiring,
development, and retention of cybersecurity professionals
3.5 Collaborate internationally to share best practices in cybersecurity career development and workforce
planning
NICE Strategic Goal #3: Guide Career Development and Workforce Planning
29. RAMPS Communities
Southwest Region: Arizona Statewide Cyber Workforce
Consortium
Western Region: Cyber Prep Program
Central Region: Cincinnati-Dayton Cyber Corridor
(Cin-Day Cyber)
Mid-Atlantic Region: Hampton Roads Cybersecurity
Education, Workforce, and Economic Development
Alliance (HRCyber)
Northeast Region: The Partnership to Advance
Cybersecurity Education and Training (PACET)
29
30. Examples of Affiliated Programs
• DHS/NSA Centers of Academic Excellence in
Cybersecurity – 2Y, Cyber Defense Ed, Research
• NSA Centers of Academic Excellence in Cyber
Operations
• NSF Advanced Technological Education Centers
• CyberCorps: Scholarship for Service Program
• GenCyber Summer Camps
• And more . . .
30
32. Roadmap to Growing and Sustaining Workforce
Community-Oriented
Employer-Led
Learner-Centered
Standards-Based
Outcomes-Driven
32
33. Cybersecurity Executive Order
Cybersecurity for the Nation: Policy
To ensure that the internet remains valuable for future
generations, it is the policy of the executive branch to
promote an open, interoperable, reliable, and secure
internet that fosters efficiency, innovation,
communication, and economic prosperity, while
respecting privacy and guarding against disruption,
fraud, and theft. Further, the United States seeks to
support the growth and sustainment of a workforce
that is skilled in cybersecurity and related fields as the
foundation for achieving our objectives in cyberspace.
33
34. Workforce Development Provision
Purpose:
In order to ensure that the United States maintains a
long-term cybersecurity advantage . . .
Three Deliverables:
• Growing and Sustaining the Cybersecurity Workforce
• International Competiveness
• National Security Advantage
Website:
nist.gov/nice/cybersecurityworkforce
34
35. Public and Private Sector Workforce
• Assess the scope and sufficiency of efforts to
educate and train the American cybersecurity
workforce of the future, including cybersecurity-
related education curricula, training, and
apprenticeship programs, from primary through
higher education
• Provide a report to the President within 120 days
with findings and recommendations regarding how
to support the growth and sustainment of the
Nation's cybersecurity workforce in both the public
and private sectors.
35
36. NICE Engagement Process
• NICE Working Group
Subgroups: K-12, Collegiate, Competitions, Training and Certifications,
and Workforce Management
• NICE Interagency Coordinating Council
• NICE Webinars (Monthly)
• NICE eNewsletter (Quarterly)
• NICE Email Updates (Periodic)
• NICE Events
Annual Conference & Expo: November 7-8, 2017, Dayton, OH
NICE K-12 Cybersecurity Education Conference: Dec 3-4, Nashville, TN
• NICE Website: nist.gov/nice
36
Editor's Notes
Let’s talk more about what the Workforce Framework is:
The National Cybersecurity Workforce Framework (Workforce Framework) is a national resource that categorizes, organizes, and describes cybersecurity work.
It provide educators, students, employers, employees, training providers and policy makers with a national standard for organizing the way we define and talk about cybersecurity work, and what is required to do that work.
It identifies the tasks (or activities) performed to carry out cybersecurity work across over 30 Specialty Areas, as well as the requisite knowledge skills, and abilities.
As more organizations align their workforce development efforts the Workforce Framework, our Nation will have a more standardized cybersecurity workforce that more effectively secures our networks.