The White House Has Four Keys To Improving Cybersecurity

Never Too Late: The US Government has a plan to to improve cybersecurity across the board. 

The US Government's new Federal Cybersecurity Workforce Strategy aims to position the government as an "employer of choice" for cybersecurity professionals that "offers rewarding, unique, and dynamic careers that rival opportunities anywhere else in the world."

The plan focuses on four initiatives to add to the government's cybersecurity workforce.

 

1.    Expanding the cybersecurity workforce through education and training.

The Cybersecurity National Action Plan recommends investing $62 million in fiscal year 2017 toward expanding cybersecurity education. Programs like the CyberCorps: Scholarship for Service program, which provides scholarships for students specializing in cybersecurity, can bring more cybersecurity workers into the government workforce.

2.    Recruiting the nation's best cyber talent.

The strategy plans to partner with agencies to "streamline hiring practices … and leverage existing hiring authorities, as appropriate, to quickly bring on new talent," according to a White House blog post.

3.    Retaining and developing highly skilled talent.

Federal agencies and OPM will create growth paths for cybersecurity professionals. Also, a government-wide cybersecurity orientation program will be created. These changes are meant to keep government cybersecurity professionals working and happy.

4.    Identifying cybersecurity workforce needs.

The strategy asks agencies to take a new approach to determining their needs, using a framework developed by partner agencies of the National Initiative for Cybersecurity Education.

The new initiative was created following the creation of the Cyber­security National Action Plan, or CNAP, earlier this year. CNAP "puts in place a long-term strategy that builds on other cybersecurity efforts while calling for innovation and investments in cybersecurity education and training to strengthen the cybersecurity talent pipeline," the White House blog states.

Association for Talent Development:

 

« Financial Institutions & Cybercrime
Artificial Intelligence & The Future Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Polyverse

Polyverse

Polyverse offers application security, zero-day defense, proactive cyber resiliency and more. Protect your critical applications with moving target defense.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.