Bill Newhouse Two Government Cybersecurity Initiatives NIST.

Slides:



Advertisements
Similar presentations
Program Overview and Activities November 2012 Karen Stang Placement Manager.
Advertisements

Innovate Now: Overview and Next Steps February 2007.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
US Business Leadership Network Conference Orlando, Florida October 2012 Karen Stang Placement Manager.
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
DHS, National Cyber Security Division Overview
Defence and Cyber Growing Threats - Changing Security Models The Need for a Change in Mindset ? The Kokoda Foundation Cyber Security Study
Cyber Huntsville Briefing to Energy Huntsville Forum 16 August 2012 Rodney L. Robertson, Ph.D. President, Cyber Huntsville Initiative
WEIS 2011 Workshop on the Economics of Information Security Chris Greer Assistant Director for Information Technology R&D White House Office of Science.
1 Building the Nation’s Cybersecurity Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch.
Texas Workforce Commission The Texas Workforce Commission (TWC) is a collaborating partner in the economic development processes for the State of Texas.
Diversity and Inclusion at NASA: A Strategic Integrated Approach
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Allen Hepner Senior Planning & Performance Manager September 22, 2011
Patricia A. Muoio Chief National Information Assurance Research Lab.
Secure and Trustworthy Cyberspace (SaTC) Program Presentation to NSF/DIMACS Workshop for Aspiring PIs in SaTC SaTC Program Directors National Science Foundation.
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
California Needs Assessment of Workforce Issues for Energy Efficiency, Demand-Side Management, Renewable Energy and the Green Economy Conducted by the.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Paul Dordal Executive Director BRAC RTF Transformation Game Plan Executive Committee May 21, 2009.
Session IV, 8:30a.m. - 9:30a.m., Thursday, 27 June Cyber Awareness and Education: Focus on the National Initiative for Cybersecurity Education (NICE)
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Connecting Workforce Development, Education and Economic Development Through Cluster- Based and Career Mapping Strategies The National Association of State.
Trends Impacting Agility in Oil & Gas 1. AGENDA External Drivers Big Trends Impacting Agility in HR How will HR Respond? 2.
Imran Ghaznavi Course Code: MGT557 COMSATS Strategic Human Resource Management.
1 Emergency Management Standards EM- XML Consortium & EM Technical Committee Presentation to Steve Cooper March 18,2003.
ICT Action Plan Refresh
Identification of national S&T priority areas with respect to the promotion of innovation and economic growth: the case of Russia Alexander Sokolov State.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Georgia Energy and Industrial Construction Consortium (GEICC) – Created Aug. 28, 2007, during the Southeast Skilled Labor Summit – Held our first official.
Page 1 Strategic Foresight Initiative Summary Briefing Emergency Management Higher Education Conference June 6, :30 – 11:30 am.
1 Building the Cybersecurity Workforce October 1, 2015 C3 & National K-12 Cybersecurity Education Conference Benjamin Scribner Department of Homeland Security.
Advancing Government through Collaboration, Education and Action Date ET SIG Cross SIG Alignment Activities Planned Page 0.
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
Moving Toward Self-Sufficiency ________________________________________________________________ Preparing Mississippi’s Workforce Presentation for Reaching.
FLMM 2005 LMI Forum Knowing and Growing: The Role of Labour Market Information in Advancing Economic Prosperity Plenary 2 - Panel Discussion Tough Decisions:
The Canadian Geospatial Data Infrastructure Presented by Prashant Shukle Director General Canada Centre for Mapping and Earth Observation.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
Leveraging Colorado’s Sector Partnerships Purpose and Goals o The Sectors Summit II: Growing the Talent Pipeline, hosted by CWDC, is a work session on.
Talent Pipeline Management. Goals 1. Introduce USCCF and our work focused on closing the skills 2. Familiarize you with the tools, resources, and supports.
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
Overview Briefing Threat and Hazard Identification and Risk Assessment (THIRA) Presidential Policy Directive 8 / PPD-8: National Preparedness May 2012.
1 Cyber Security Major R&D Challenges Ram Krishnan Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Crisis management related research at
Cyber Risk Presentation to the Board of Directors
Workforce Development Areas
Cybersecurity Education & Awareness Overview
CYBER NB – A CALL TO ACTION
Oklahoma’s Workforce Information Programs Education Job Seekers Employees Employers Oklahoma’s Workforce.
This presentation provides:
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
8 Building Blocks of National Cyber Strategies
Office of Secretary of Defense
An Urgent National Imperative
Cybersecurity ATD technical
AFCEA EDUCATION SUMMIT CYBER SECURITY – A NATIONAL PROBLEM Kathy Cowles, Cyber Committee Ernest McDuffie, National Initiative for Cybersecurity Education.
Employee engagement Delivery guide
CERTS Workshop 3: "Indicators of Effective Workforce Development Initiatives" Chair: Captain Glenn Hernandez, USCG (Ret) Senior Consultant, OpEdge.
A Focus on Strategic vs. Tactical Action for Boards
Modernising Methodology for UK Statistics
Agency Action Plan on Diversity and Inclusion Presentation to the Labour Management Consultation Committee (LMCC) October 3, 2017.
Presentation transcript:

Bill Newhouse Two Government Cybersecurity Initiatives NIST

Agenda 1. An overview of the National Initiative for Cybersecurity Education (NICE) including - What is your role in it? 2. An overview of the soon-to-released "Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program" - Why it matters to you?

Interagency Process led by NIST Component 1: Cybersecurity Awareness Component 2: Formal Cybersecurity Education Component 3: Cybersecurity Workforce Structure Component 4: Cybersecurity Workforce Training and Development

National Initiative for Cybersecurity Education (NICE) NICE Accomplishments Completed the public review period on October 3 rd for the draft Strategic Plan which identifies goals and objectives of the initiative. Introduced the NICE Cybersecurity Workforce Framework for public comment until December The framework can be overlaid onto any organization’s existing occupational structure and is designed to baseline capabilities, identify skill gaps, develop cybersecurity talent in the workforce, and prepare the pipeline of future talent. Hosted 2 nd Annual NICE Workshop, “Shaping the Future of Cybersecurity Education – Engaging Americans in Securing Cyberspace”, with over 300 attendees from academia, government and industry.

National Initiative for Cybersecurity Education Draft Strategic Plan 1. Raise awareness among the American public about the risks of online activities. 2. Broaden the pool of skilled workers capable of supporting a cyber-secure nation. 3. Develop and maintain an unrivaled, globally competitive cybersecurity workforce

National Initiative for Cybersecurity Education Future Plans Promote the NICE Cybersecurity Workforce Framework Seven high-level categories, each comprising several specialty areas. Organizing structure is based on extensive job analyses and groups together work and workers that share common major functions, regardless of actual job titles or other occupational terms. As the job analysis information regarding these specialty areas is extensive, only the framework is published here. Additional details regarding each specialty area, as well as more information about the framework in general, is available online.

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program As a research and development strategy, this plan defines four thrusts: Inducing Change: utilizing game-changing themes to understand the underlying root causes of existing cybersecurity deficiencies with the goal of disrupting the status quo Developing Scientific Foundations: minimizing future cybersecurity problems by developing the science of security Maximizing Research Impact: catalyzing coordination, collaboration, and integration of research activities across Federal agencies for maximum effectiveness Accelerating Transition to Practice: expediting improvements in cyberspace from research findings through focused transition programs

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Themes for Inducing Change: Tailored Trustworthy Spaces Supporting context specific trust decisions Moving Target Providing resilience through agility Cyber Economic Incentives Providing incentives to good security Designed-in Security Developing and evolving secure software systems