Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/16/2019
10:00 AM
Ryan Shaw
Ryan Shaw
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Cyber Workforce Exec Order: Right Question, Wrong Answer

Shuffling resources, adding administrative process, and creating a competition and incentive system will do little to grow and mature the talent we need to meet the cybersecurity challenges we face.

The recent Executive Order on America’s Cybersecurity Workforce is intended to bolster public sector cybersecurity talent and improve our ability to hire, train, and retain a skilled workforce. Unfortunately, it ignores the real challenges we face in securing our public infrastructure: high turnover, outdated models, and an excess of administrative processes. Instead, the EO focuses on a series of relatively superficial initiatives seemingly designed to get people more excited about cybersecurity. These include:

• A cybersecurity rotational program
• A common skill set lexicon/taxonomy based on the NICE framework
• An annual cybersecurity competition with financial and other rewards for civilian and military participants 
• An annual cyber education award presented to elementary and secondary school educators
• A skills test to evaluate cyber aptitude in the public sector workforce

While it's great to see the continued focus on addressing our substantial national cyber challenges, this Executive Order is an attempt to address a severe talent shortage by shuffling resources, adding administrative process, and creating a competition and incentive system that will do little to grow and mature the cyber labor force. 

It is time to accept that we won't be able to fill hundreds of thousands of job openings any time in the foreseeable future. By taking some tough, but necessary, steps to transform the way our workforce does its job every day, we can begin to address our collective challenges and position the cybersecurity workforce for sustainable success. These steps should include: 

Reducing bureaucracy: The answer is not to add administrative overhead to an already understaffed workforce through more classifications, testing, competitions, and standards.

Rethinking our assumptions: We need to revisit staffing models and procurements that require large numbers of people, because "that is how we have always done things." Instead, we must focus on getting more efficiencies and capability out of the teams that exist today, by implementing new performance measures, focused on the achievement of end goals and not technology justification. In addition, we need to transition from task-based hiring to roles focused on current problem sets.

Focusing on automation: Our staffing requirements are growing to a level that are, and will continue to be, impossible to meet. If we're going to encourage competition and innovation, we should focus on ways to augment the people we already have in our workforce to make them more productive through automation versus only automating basic tasks.

Improving engagement and retention: We need to ask some tough questions about why cyber retention in the federal government is so low. One answer is that operators are too bogged down with administrative processes, arduous clearance requirements, and compliance-driven activities that result in extremely low job satisfaction. Cyber competitions can be great fun, but our public sector resources are much better spent making the daily jobs of our workforce just as rewarding and engaging.

The cyber talent gap is a real problem, caused in large part by conditions we ourselves have created. The solution is to revisit the way our workforce does its job on a daily basis to better empower our workers. Fortunately, it's possible to do that using current investments in people and technology. Building and sustaining our national cybersecurity workforce is a big challenge. We must think equally big if we're going to meet that challenge head on. 

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Ryan's experience spans over 20 years, having secured systems at US Attorneys' offices across the country, the Transportation Security Administration and throughout the private sector. Most recently, he served as Chief Operating Officer of Foreground Security. He is currently ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13759
PUBLISHED: 2020-06-02
rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attackers to cause a denial of service (loss of IP networking) because read_obj and write_obj do not properly access memory. This affects aarch64 (with musl or glibc) and x86_64 (with musl).
CVE-2020-7662
PUBLISHED: 2020-06-02
websocket-extensions npm module prior to 1.0.4 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other characte...
CVE-2020-7663
PUBLISHED: 2020-06-02
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other charact...
CVE-2020-12017
PUBLISHED: 2020-06-02
GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacke...
CVE-2018-18623
PUBLISHED: 2020-06-02
Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.