Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
How to build a better cybersecurity workforce
Wednesday - 11/17/2010, 10:31am EST
Senior Internet Editor
There's a critical shortage of cybersecurity professionals. The questions are how to fix the problem and what the problem is.
"It is the consensus of the Commission that the current professional certification regime is not merely inadequate; it creates a dangerously false sense of security...."
But certification is not the problem if you ask front-line information security professionals from government and industry, says ISC-squared.
So they did.
In the Survey on Human Capital Crisis Recommendations, ISC-squared asked 700 information security professionals for their thoughts on the CSIS proposals for professional licensing through testing and the creation of an examination review board.
When asked "Do you believe a government-run Board of Examiners would close this gap (between existing certification programs and the specific cybersecurity skills that are needed in the workplace)?" 69.0% said no.
Hord Tipton, executive director of ISC-squared and a former CIO at the Interior Department, told Federal News Radio, "licensing is trying to solve the wrong problem."
Instead, said Tipton, the long term solution "really must be built...and sustained upon the existing education, training and certification infrastructure."
A licensing board that would "make it illegal to practice IT security without a license," said Tipton, would be a major setback to work that has already been done and would be a major setback against meeting the shortage of people.
While he agrees there does need to be oversight, "we must clearly define what the problems are and then develop a plan about going about doing that."
One of the problems discussed in ISC's survey has to do with a lack of a career path.
If you talk to any security professional, you won't find a high percentage that actually started out with the intent of being an information technologist or specifically an information technologist specializing in security. We do not have the academic base that's longstanding like the medical profession, legal profession, even the accountants and CPAs. Those are well entrenched within the academic system and people can come up and there's a very familiar career path.
"What we need to do," said Tipton, "is work with schools to build a pipeline."
And not just the government. Tipton said the effort should involve every stakeholder. "We have to work together. It really doesn't matter who does it. There's plenty of room here for everyone. We shouldn't toss out or ignore things that are established."
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.