Cybersecurity Capability Maturity Model

Cybersecurity is one of the leading national security challenges facing this country today. An emerging topic of importance is how organizations track, assess, grow, and shape this workforce. Many organizations have turned to workforce planning as a way to understand their current cybersecurity human capital skills and abilities as well as potential infrastructure needs. The National Initiative for Cybersecurity Education (NICE) evolved from the Comprehensive National Cybersecurity Initiative (CNCI), Initiative 8- Expand Cyber Education, to develop a technologically-skilled and cyber-savvy workforce with the right knowledge and skills. Towards those ends, Component 3 of NICE is focused on the cybersecurity Workforce Structure — specifically talent management and the role of workforce planning in developing the national cybersecurity workforce. NICE has initiated discussion and guidance on workforce planning for cybersecurity best practices. In Spring 2012, NICE published a white paper titled: Best Practices for Planning a Cybersecurity Workforce1, which introduces workforce planning methodologies for cybersecurity. This next paper introduces a qualitative management tool, a Cybersecurity Workforce Planning Capability Maturity Model, to help organizations apply the elements of best practice workforce planning to analyze their cybersecurity workforce requirements and needs.

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

OTHER WHITEPAPERS
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

Events