Increase Cyber-Security Workforce, Government Urged - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Cybersecurity
12:00 PM

Increase Cyber-Security Workforce, Government Urged

Cyber-security organization offers seven recommendations to the White House and defense agencies on improving worker qualifications and strengthening security built into IT.

Federal agencies must take more concrete measures to address a shortage of skilled specialists who can protect government IT systems from cyber-security threats, a leading cyber-security group advised the Obama administration.

The International Internet System Security Certification Consortium, or (ISC)2, this week released seven recommendations it delivered to the White House, Departments of Homeland Security and Defense, and the National Institute of Standards and Technology (NIST) aimed at easing the shortage of qualified cybersecurity professionals.

Some of the recommendations, delivered to government agencies earlier this month, focused on the shortage of employees with the specialized skills to combat cyberthreats. Among the measures, the consortium recommended:

  • Aligning existing workforce development programs, such as the Scholarship for Service and Centers for Academic Excellence programs, with NIST's National Initiative for Cybersecurity Education (NICE) framework
  • Implementing the Defense Department's 8570.01-M, "Information Assurance Workforce Improvement Program," across the government
  • Setting up a cyber "special forces" team designed to employ talented cyber-security workers who, whether because of personality or previous personal conduct, would not normally be able to obtain security clearances or work in a typical agency culture

"The biggest mistake we see is government and companies putting people in the wrong jobs," said W. Hord Tipton, executive director of (ISC)2 and former CIO of the Interior Department. He said these recommendations would expand the pool of prospective candidates with the skills needed for open cyber-security positions.

[Can our governments really afford to fall further behind in IT security competence? Read: The Troubling Decline Of IT Security Training.]

Alan Paller, research director of the SANS Institute, said he disagreed with the (ISC)2 manpower recommendations.

"The NICE framework has identified so many different characteristics of people for jobs, [put] so much extraneous stuff in, the government is hiring unqualified people," Paller said. "You can have 10 out of 12 skills where the two are technical skills and you can qualify for high-tech jobs."

'The biggest mistake we see is government and companies putting people in the wrong jobs.' — W. Hord Tipton, (ISC)2 Executive Director
"The biggest mistake we see is government and companies putting people in the wrong jobs."
— W. Hord Tipton, (ISC)2 Executive Director

(ISC)2 also suggested ways to improve the security of software and hardware products, including changes to government acquisitions and heightened security awareness of the supply chain, recommending:

  • Updating the Federal Acquisition Regulations (FAR) with modular language that requires cloud providers meet FedRAMP, FISMA, and specific information security requirements, including ensuring personnel are qualified to operate securely in a cloud environment
  • Including modular language in FAR concerning secure and resilient technology, both hardware and software, through assured supply chains and applying risk-management tools and techniques to those supply chains
  • Demanding superior software, created with qualified security software professionals participating in the development lifecycle, including government expectations that security is "baked in"

"The widespread adoption of the cloud and cloud services has completely changed the dynamics of how... to find a provider, how to evaluate them," Tipton said. "It has to be done through contract terms."

SANS's Paller strongly endorsed these recommendations. He pointed out that building security into the technological DNA of software and hardware "reduces the load" on security professionals and improves efficiency.

The final recommendation made by (ISC)2 suggested that the government enforce accountability for security, particularly for managers and business owners -- not security professionals -- who fail to make the investments needed to meet standards set by FISMA and other requirements.

Paller found merit in this final suggestion, but he emphasized that individuals and organizations should be praised for their positive security accomplishments, and encouraged to share their successes publicly.

"You don't have to play the gotcha game," Paller said. "People are afraid to talk about good security because they're afraid of becoming targets. But we need to talk about successes so that people can learn from them."

Patience Wait is a Washington-based reporter who writes regularly about government IT for InformationWeek.

Mobile, cloud, and BYOD blur the lines between work and home, forcing IT to envision a new identity and access management strategy. Also in the Future Of Identity issue of InformationWeek: Threats to smart grids are far worse than generally believed, but tools and resources are available to protect them. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Author
12/19/2013 | 5:24:29 PM
Thanks for the recap of the (ISC) report, Patience. I'm curious about whether the authorsoutlines how they would go about enforcing security accountability. Were audits recommended? And if so, by whom?

Susan Fogarty
Susan Fogarty,
User Rank: Author
12/23/2013 | 10:19:33 AM
Re: Calling the workforce "unqualified" shows a complete lack of the present working environement
Yes, I agree, many IT folks who work for the government are highly qualified but hamstrung by very complicated budget structures (or lack of it) and being spread extremely thin. It certainly doesn't help that the NSA's reaction to the Edward Snowden affair was to reduce IT staff by 90% to reduce the chance of additional data leaks.
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Pandemic Responses Make Room for More Data Opportunities
Jessica Davis, Senior Editor, Enterprise Apps,  5/4/2021
10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Transformation, Disruption, and Gender Diversity in Tech
Joao-Pierre S. Ruth, Senior Writer,  5/6/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll