Increase Cyber-Security Workforce, Government Urged
Cyber-security organization offers seven recommendations to the White House and defense agencies on improving worker qualifications and strengthening security built into IT.
Federal agencies must take more concrete measures to address a shortage of skilled specialists who can protect government IT systems from cyber-security threats, a leading cyber-security group advised the Obama administration.
The International Internet System Security Certification Consortium, or (ISC)2, this week released seven recommendations it delivered to the White House, Departments of Homeland Security and Defense, and the National Institute of Standards and Technology (NIST) aimed at easing the shortage of qualified cybersecurity professionals.
Some of the recommendations, delivered to government agencies earlier this month, focused on the shortage of employees with the specialized skills to combat cyberthreats. Among the measures, the consortium recommended:
Aligning existing workforce development programs, such as the Scholarship for Service and Centers for Academic Excellence programs, with NIST's National Initiative for Cybersecurity Education (NICE) framework
Implementing the Defense Department's 8570.01-M, "Information Assurance Workforce Improvement Program," across the government
Setting up a cyber "special forces" team designed to employ talented cyber-security workers who, whether because of personality or previous personal conduct, would not normally be able to obtain security clearances or work in a typical agency culture
"The biggest mistake we see is government and companies putting people in the wrong jobs," said W. Hord Tipton, executive director of (ISC)2 and former CIO of the Interior Department. He said these recommendations would expand the pool of prospective candidates with the skills needed for open cyber-security positions.
Alan Paller, research director of the SANS Institute, said he disagreed with the (ISC)2 manpower recommendations.
"The NICE framework has identified so many different characteristics of people for jobs, [put] so much extraneous stuff in, the government is hiring unqualified people," Paller said. "You can have 10 out of 12 skills where the two are technical skills and you can qualify for high-tech jobs."
"The biggest mistake we see is government and companies putting people in the wrong jobs." — W. Hord Tipton, (ISC)2 Executive Director
(ISC)2 also suggested ways to improve the security of software and hardware products, including changes to government acquisitions and heightened security awareness of the supply chain, recommending:
Updating the Federal Acquisition Regulations (FAR) with modular language that requires cloud providers meet FedRAMP, FISMA, and specific information security requirements, including ensuring personnel are qualified to operate securely in a cloud environment
Including modular language in FAR concerning secure and resilient technology, both hardware and software, through assured supply chains and applying risk-management tools and techniques to those supply chains
Demanding superior software, created with qualified security software professionals participating in the development lifecycle, including government expectations that security is "baked in"
"The widespread adoption of the cloud and cloud services has completely changed the dynamics of how... to find a provider, how to evaluate them," Tipton said. "It has to be done through contract terms."
SANS's Paller strongly endorsed these recommendations. He pointed out that building security into the technological DNA of software and hardware "reduces the load" on security professionals and improves efficiency.
The final recommendation made by (ISC)2 suggested that the government enforce accountability for security, particularly for managers and business owners -- not security professionals -- who fail to make the investments needed to meet standards set by FISMA and other requirements.
Paller found merit in this final suggestion, but he emphasized that individuals and organizations should be praised for their positive security accomplishments, and encouraged to share their successes publicly.
"You don't have to play the gotcha game," Paller said. "People are afraid to talk about good security because they're afraid of becoming targets. But we need to talk about successes so that people can learn from them."
Patience Wait is a Washington-based reporter who writes regularly about government IT for InformationWeek.
Mobile, cloud, and BYOD blur the lines between work and home, forcing IT to envision a new identity and access management strategy. Also in the Future Of Identity issue of InformationWeek: Threats to smart grids are far worse than generally believed, but tools and resources are available to protect them. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.