|
|
|
Welcome to the NICE eNewsletter
Welcome! My name is Aditya Singh, and I was an Intern at the NICE Program Office this past summer. I secured my internship with NICE through the Summer High School Internship Program (SHIP) at NIST. I am currently a senior at River Hill High School in Clarksville, Maryland, and as I apply for college I hope to pursue a major in Computer Science. One of my main projects this summer was to analyze the numerous categories and subcategories of the Framework for Improving Critical Infrastructure Cybersecurity and align them to the NICE Cybersecurity Workforce Framework work roles. While both frameworks sufficiently describe cybersecurity, it is helpful to see them mapped together to show linkages between the what and the who of cybersecurity work. This quarter’s featured article will further explain how these two frameworks meet. I hope my contributions to this mapping project provide a greater level of understanding!
|
Aditya Singh NICE Program Office Intern
|
|
|
NICE Framework Meets Cybersecurity Framework
by Bill Newhouse, Deputy Director, National Initiative for Cybersecurity Education, National Institute of Standards and Technology, U.S. Department of Commerce, and Greg Witte, Security Engineer, G2 Inc.
Two important efforts underway within ACD include the Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework), which helps organizations to better understand and improve their cybersecurity risk management and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework). Both the Cybersecurity Framework and the NICE Framework offer a common lexicon and taxonomy that have helped to evolve our nation’s efforts in cybersecurity risk management and workforce education and training. Read More
|
|
|
|
NICE Framework in Focus |
|
|
|
|
A profile of a cybersecurity practitioner to illustrate application of the NICE Cybersecurity Workforce Framework categories, specialty areas, and work roles.
|
|
CATEGORY: Protect and Defend
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
|
|
NAME: Matthew McCollough
TITLE: Security Operations Center (SOC) Analyst
ORGANIZATION: Minnesota IT Services ISRM Security Operations Center
SPECIALTY AREA: Cyber Defense Analysis/Incident Response
WORK ROLE: Cyber Defense Analyst/Cyber Defense Incident Responder
ACADEMIC DEGREES: Associate of Applied Science in Paramedic Sciences, Century College; Associate of Applied Science in Network and Systems Administration; Bachelor of Science in Business and Physiology, University of Minnesota; Master of Science in Information Assurance and Cybersecurity, Saint Cloud State University
CERTIFICATIONS: CompTIA Security+; CompTIA Cybersecurity Analyst CySA+; Certified Information Security Professional (CISSP) Associate
|
|
|
|
|
NICE Spotlight On |
|
|
Connecting Cybersecurity Professionals to Every Classroom
by Sean McNally, CyberPatriot Coordinator, Elk Grove Unified School District (EGUSD); Veronica Barajas, Librarian, Zachry Middle School; Marc Segal, Director of Innovation, Atlas; and Matt Pronio, Program Manager, Nepris
We have a unique situation — a low jobless rate, record job openings, and more than enough people to fill them. So why aren’t employers hiring the millions available who are actively looking for work? Read More
|
The CEO Almost Didn't Graduate, Yet Donated $50 Million to his Alma Mater
by Matt Richards, Chief Marketing Officer, Datto
While the hit felt by loss of data can be equal to businesses of all sizes, large corporations have the financial resources to protect their data against large scale attacks with high-end infrastructure. Small and medium sized businesses simply do not. Datto’s CEO, Austin McChord, wanted to do something about it. Read More
|
U.S. Department of Energy CyberForce Competition
by Brian Marko, Program Manager, Energy Sector Exercises, Infrastructure Security & Energy Restoration (ISER), Office of Cybersecurity, Energy Security, and Emergency Response (CESER), U.S. Department of Energy
This competition is focused on building actual scenarios relevant to the energy sector that incorporate real-world constraints such as limited budget for maintenance or upkeep, insufficient understanding of the system’s needs, website defacement, and lack of permission controls. Read More
|
|
|
|
The National Science Foundation, in coordination with the Office of Personnel Management, has developed a Community College Cyber Pilot (C3P) program as part of NSF's CyberCorps®: Scholarship for Service (SFS) program.
|
|
The National Security Agency is soliciting proposals from universities, public or private schools or school systems, not-for-profit institutions, or non-profit institutions to participate in the 2019 GenCyber Program.
|
|
The Workforce Management subgroup recently released a draft guidebook, Cybersecurity is Everyone’s Job, which provides things to know, and things to do, for everyone in an organization regardless of its type or size.
|
|
|
Subscribe
NICE eNewsletters will only be sent to those subscribed.
Sign up here to continue to receive this complimentary eNewsletter.
|
|