Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
GAO: Agencies struggle to define cybersecurity workforce
Tuesday - 11/29/2011, 9:26pm EST
Federal News Radio
Several large departments have failed to close cybersecurity workforce gaps that could hinder efforts to protect their computers and networks, according to congressional auditors.
Among the gaps, the agencies have struggled to define the size of their cybersecurity payrolls, the Government Accountability Office said in its report.
GAO studied eight departments, including national security organizations, such as the Departments of Defense and Homeland Security.
The issue with cybersecurity workforce size stems in part from variations in how agencies define work and the lack of an occupational series specific to cybersecurity, GAO said.
"A series is used to identify a specific occupation and generally includes all jobs in that particular kind of work at all grade levels," the report said. "However, [the Office of Personnel Management's] 2010 cybersecurity data collection showed that federal agencies used multiple series for their cybersecurity workforce. None of these series identifies cybersecurity as the only job responsibility. In many cases, employees with cybersecurity responsibilities also have other responsibilities, and some employees classified under a particular series may not have any cybersecurity responsibilities."
GAO also found problems with the way the agencies conduct cybersecurity workforce planning.
"All agencies had defined roles and responsibilities for their cybersecurity workforce," GAO said. "But these roles did not always align with guidelines issued by the federal Chief Information Officers Council and National Institute of Standards and Technology (NIST)."
Information security made it onto GAO's high-risk list 14 years ago, in 1997. Since then, auditors inside and outside of government have, on numerous occasions, exposed critical gaps in the cybersecurity workforce.
In 2009, for example, the Partnership for Public Service and Booz Allen Hamilton flagged multiple regulations and procedures as barriers to timely hiring decisions. And in 2010, the DHS inspector general reported trouble filling empty jobs in the department's National Cyber Security Division.
Agencies still struggle to fill highly technical positions, mainly because of a lengthy and complicated federal hiring process and discrepancies in compensation across agencies, according to the GAO report.
"Although most agencies used some form of incentives to support their cybersecurity workforce, none of the eight agencies had metrics to measure the effectiveness of these incentives," GAO said.
GAO also reported problems with cybersecurity training and development programs, citing a lack of consistency among agencies.
"For example, the Departments of Commerce and Defense required cybersecurity personnel to obtain certifications and fulfill continuing education requirements," the report said. "Other agencies used an informal or ad hoc approach to identifying required training."
Auditors developed 17 recommendations, to address the shortfalls they flagged. For example, to improve cybersecurity workforce planning, GAO said the CIO Council should create a strategy for agencies' use of data from the IT Workforce Capability Assessment, which OPM will use to help create a specialized career path for IT program managers.
To address the training issues, GAO recommended DHS track how much agencies use and value educational programs in the Information Systems Security Line of Business. Auditors also recommended DHS improve efforts to reduce duplication in the programs.
The GAO report also recommended improvements to the NIST National Initiative for Cybersecurity Education (NICE), which includes projects to improve cybersecurity workforce training and duties. GAO said, among other things, NICE lacks a clear list of agency activities under the initiative and a means to measure the progress of each activity. The agency recommended leaders clarify NICE's governance structure, to specify responsibilities for planning and monitoring the activities.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.