Skip to main content
U.S. flag

An official website of the United States government

Reference List

The following Reference List contains cybersecurity articles, strategies, reports, programs, and efforts that were compiled and consulted as part of an environmental scan to inform the assessment of current cybersecurity education and training efforts.

Please note: These resources were referenced in 2017. Some of the original links may no longer be working and/or accurate.


Download PDF

References

A Cybersecurity Agenda for the 45th President. (2017, January 5). Retrieved from https://www.csis.org/news/cybersecurity-agenda-45th-president(link is external)

An Examination of the Cybersecurity Labor Market. (n.d.). Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf(link is external)

Applications Now Available for City Colleges of Chicago’s New Cyber Security “Boot Camp”. (2017, March 18). Retrieved from http://www.ccc.edu/news/Pages/Applications-Now-Available-for-City-Colleges-of-Chicagos-New-Cyber-Security-Boot-Camp-.aspx(link is external)

ApprenticeshipUSA Investments. (2017, June 22). Retrieved from https://www.dol.gov/featured/apprenticeship/grants

Assante, M., Tobey, D. (2011, February 4). Enhancing the Cybersecurity Workforce. Retrieved from http://ieeexplore.ieee.org/document/5708280/(link is external)

Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text

ATE Centers. (n.d.). Retrieved from http://www.atecenters.org/(link is external)

ATE Centers and National Science Foundation. (n.d.). ATE Centers Impact Report. Retrieved from http://www.atecenters.org/wp-content/uploads/PDF/ATEIMPACT_2016-17.pdf(link is external)

ATE Centers and National Science Foundation. (n.d.). ATE Programs and Overview. Retrieved from http://www.atecenters.org/wp-content/uploads/2016/07/ATE_Overview_2016.pdf(link is external)

AUSTRALIA’S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity [PDF]. (n.d.). Retrieved from https://cybersecuritystrategy.pmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf(link is external)

Baltimore Cyber Range and Cyberbit Open New Cybersecurity Training and Simulation Center. (2017, August 3). Retrieved from https://www.cyberbit.com(link is external)

Bessen, J. (2014, August 25). Employers Aren’t Just Whining – the “Skills Gap” is Real. Harvard Business Review. Retrieved from https://hbr.org/2014/08/employers-arent-just-whining-the-skills-gap-is-real(link is external)

Best in Class Strategies for Entry-Level Employee Retention Prepared for 100K [PDF]. (2016, October). FSG Reimagining Social Change. Retrieved from https://www.100kopportunities.org/2016/10/14/best-in-class-strategies-for-entry-level-employee-retention/(link is external)

Best Places to Work for Cyber Ninjas. (2017, May). Retrieved from https://www.sans.org/best-places-to-work-for-cyber-ninjas?ref=195285(link is external)

Bojanova, I., Vaulx, F., Zettsu, K., Simmon, E., Sowe, S. (2016, January 21). Cyber-Physical-Human Systems Putting People in the Loop. IT Professional. Retrieved from http://ieeexplore.ieee.org/document/7389271/(link is external)

Burning Glass Technologies. (2015). Job Market Intelligence: Cybersecurity Jobs, 2015 [PDF].   Retrieved from https://ahed.assembly.ca.gov/sites/ahed.assembly.ca.gov/files/hearings/Cybersecurity_Jobs_Report_2015.pdf

Canadian Apprenticeship Forum Forum Canadien Sur I’Apprentissage. (2009, June). It Pays to Hire an Apprentice: Calculating the Return on Training Investment for Skilled Trades Employers in Canada A Study of 16 Trades Phase II Final Report. Retrieved from https://www.nsapprenticeship.ca/sites/default/files/files/CAF-pays.pdf 

Carlini, J. (2017, August 6). Geneva Convention in Cyberwarfare? Don't Count on It. Retrieved from https://intpolicydigest.org/2017/08/06/geneva-convention-cyberwarfare-don-t-count/(link is external)

Carlini, J. (2017, August 06). Preparing for Nanokrieg: Electronic Wars Being Won and Lost in Microseconds. Retrieved from https://www.jstor.org/stable/26497116(link is external)

Carlini, J. (2016, April 30). Nanokrieg: The Next Trillion Dollar War | @CloudExpo #Cloud #Security. Retrieved from https://icloud.pe/blog/nanokrieg-the-next-trillion-dollar-war-cloudexpo-cloud-security/(link is external)

Carsen, D. (2017, July 31). High School Students Track Real Cybercriminals at UAB. Retrieved from  https://news.wbhm.org/feature/2017/high-school-students-track-real-cybercriminals-uab/(link is external)

Center for Long-Term Cybersecurity, UC Berkeley. (2016). Cybersecurity Policy Ideas for a New Presidency. Retrieved from https://cltc.berkeley.edu/2016/11/18/livestream-new-report-and-panel-on-cybersecurity-policy-ideas-for-a-new-presidency/(link is external)

Charney, D. (2017, February 3). 6 Talent Trends to Watch in 2017. Material Handling and Logistics (MH&L). Retrieved from http://mhlnews.com/salary-survey/6-talent-trends-watch-2017(link is external)

Clabaugh, J. (2017, June 22). The right stuff: DC area companies ready to hire, struggle to fill IT jobs. WTOP. Retrieved from http://wtop.com/business-finance/2017/06/the-right-stuff-dc-area-companies-struggle-to-fill-it-jobs-more-to-open/(link is external)

Coastline Community College. (2016). California Cybersecurity Apprenticeship Project (CCAP). Retrieved from https://drive.google.com/file/d/0B1wjRZl99PuZektWS3k3SEVKVms/view 

Collegiate Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/collegiate-sub-working-group

Commission on Cybersecurity for the 44th Presidency. (2015, September 28). Retrieved from https://www.csis.org/programs/technology-policy-program/cybersecurity/other-projects-cybersecurity/commission(link is external)

Communications Security, Reliability and Interoperability Council. (2017). Final Report- Cybersecurity Workforce Development Best Practices Recommendations. Retrieved from https://www.fcc.gov/files/csric5-wg7-finalreport031517pdf 

Competitions Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/competitions-sub-working-group

CompTIA. (n.d.). Retrieved from https://www.comptia.org(link is external)

Concanon, K., Williams, R., Feehan, D., Uvin, J., Yudin, M., Foster, D., … Monje, C. (2016). Federal Partnership regarding career pathways [PDF letter]. Retrieved from https://careerpathways.workforcegps.org/~/media/WorkforceGPS/careerpathways/Files/Career%20Pathways%20Joint%20Letter%202016.pdf(link is external) 

Conklin, W., Cline, R., & Roosa, T. (2014, March 10). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. Retrieved from http://ieeexplore.ieee.org/document/6758852/(link is external)

Control-Alt-Hack(R). (n.d.). Retrieved from http://www.controlalthack.com/(link is external)

Costanzo, J. (2017). Hampton Roads Cybersecurity Education, Workforce, and Economic Development Alliance (HRCyber) Mid-Project Report “Bridging the cybersecurity talent gap in Hampton Roads” [PDF]. Retrieved from http://securitybehavior.com/hrcyber/doc/HRCyber%20Mid-Project%20Report.pdf(link is external)

Consortium Enabling Cybersecurity Opportunities and Research. (n.d.). K-20 Cybersecurity - CECOR Project . Retrieved from http://cset.nsu.edu/programs/k20cybersecurity(link is external)

Cyberbit Protecting a New Dimension. (2017). Cyberbit Range The First Hyper-Realistic Simulation Platform for Cyber Security Experts [PDF]. Retrieved from https://www.infosecurityeurope.com/__novadocuments/362748?v=636315473978100000(link is external)

Cyberbit Protecting a New Dimension. (n.d.). Retrieved from https://www.cyberbit.com/(link is external)

CyberCorps ®: Scholarship for Service. (n.d.). Retrieved from https://www.sfs.opm.gov/

Cybersecurity Enhancement Act of 2014, Pub. L. No, 113-274, 128 Stat. 2971. (2014). Retrieved from https://www.congress.gov/bill/113th-congress/senate-bill/1353/text

CYBERSECURITY WORKFORCE DEVELOPMENT TOOLKIT How to Build a Strong Cybersecurity Workforce [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://niccs.us-cert.gov/workforce-development/cybersecurity-workforce-development-toolkit

Cyber Security Capital We help cyber security professionals succeed. (n.d.). Retrieved from http://cybersecuritycapital.com(link is external)

Cyberseek. (n.d.). Retrieved from http://cyberseek.org/(link is external)

Cyber Competitions. (2017, May 19). Retrieved from https://niccs.us-cert.gov

Cyber Discovery | NICERC. (2016). Retrieved from https://nicerc.org/events/cyber-discovery/(link is external)

Cyber Innovation Center. (2016). Retrieved from https://cyberinnovationcenter.org/(link is external)

Cyber IN-security Strengthening the Federal Cybersecurity Workforce [PDF]. (2009, July). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org(link is external)

Cyber IN-security II Closing the Federal Talent Gap [PDF]. (2015, April). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org(link is external)

Cyber Space Policy Review Assuring a Trusted and Resilient Information and Communications Infrastructure [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov

Dana, J. (2017, April 8). The Utter Uselessness of Job Interviews. The New York Times. Retrieved from https://www.nytimes.com/2017/04/08/opinion/sunday/the-utter-uselessness-of-job-interviews.html(link is external)

Department of Homeland Security. (2017). National Cyber Security Awareness Month October 2017 [PDF]. Retrieved from https://www.dhs.gov/sites/default/files/publications/NCSAM%202017%20Themes%20One%20Pager-%20508%20compliant.pdf

Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016). Memorandum for Heads of Executive Departments and Agencies. Retrieved from http://www.ncsl.org/documents/statefed/Federal_Cybersecurity_WorkforceStrategy.pdf(link is external)

Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016, July 12). Strengthening the Federal Cybersecurity Workforce [Blog]. The White House President Barack Obama. Retrieved from https://obamawhitehouse.archives.gov/blog/2016/07/12/strengthening-federal-cybersecurity-workforce 

Economics and Statistics Administration U.S. Department of Commerce. (2016, November 16). The Benefits and Costs of Apprenticeships: A Business Perspective. This resource was originally sourced from the Economics and Statistics Administration. 

EducationHQ News Team. (2017, July 26). Cyber Teacher Professional Learning Series Comes To Australia. Retrieved from https://au.educationhq.com/news/40906/cyber-teacher-professional-learning-series-comes-to-australia/?utm_medium=email&utm_campaign=EducationWeek Australia - Weekend test&utm_content=EducationWeek Australia - Weekend test%2BCID_ef0e00fb43ab4c60c283d7f99a5dba28&utm_source=EducationHQ Campaigns&utm_term=Cyber Teacher Professional Learning Series Comes To Australia(link is external)

Eichensehr, M. (2017, August 3). Baltimore Cyber Range training facility opens at Power Plant Live. Retrieved from https://www.bizjournals.com/baltimore/news/2017/08/03/baltimore-cyber-range-training-facility-opens-at.html(link is external)

Elbit Systems of America. (n.d.). Retrieved from http://www.elbitsystems-us.com(link is external)

Electronic Technology Associates. (2017). Capabilities Statement.  

Elsey, B., Lanier, L., Jessie, S. (2015). Career Pathways Toolkit: A Guide for System Development [PDF]. Retrieved from https://wdr.doleta.gov/directives/attach/TEN/TEN_17-15_Attachment_Acc.pdf

Executive Women's Forum. (n.d.). Retrieved from http://www.ewf-usa.com/(link is external)

FACT SHEET: Cybersecurity National Action Plan. (2016, February 9). Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan

Federal Communications Commission. (2016, January 29). Task Force on Optimal PSAP Architecture (TFOPA) An FCC Federal Advisory Committee Final Adopted Report. Retrieved from https://apps.fcc.gov/edocs_public/attachmatch/DA-16-179A2.pdf

Federal Cybersecurity Workforce Assessment Act, S.2007, 114th Congress. (2015). Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/actions

FISSEA. (n.d.). FISSEA: Federal Information Systems Security Educators’ Association. Retrieved from FISSEA | NIST

Foote Partners, LLC Foote Research Group. (2016). Cash premiums earned by 65,082 IT professionals, specifically earmarked to 854 certified and noncertified IT skills, rise in 2016; IT security certifications post the highest gains over last 3,6, and 12 months among all certifications categories; For noncertified tech skills, Applications Development related skills continue to beat all others, led by not Big Data and Cloud skills [PDF].  Retrieved from http://www.footepartners.com/fp_pdf/FooteNewsrelease_2Q16ITSkillsTrends_09182016.pdf(link is external)

GenCyber. (n.d.). Retrieved from https://www.gen-cyber.com/(link is external)

General Motors. (2017, June 28). General Motors: GM Intensifies Push to Train Young People for Jobs of Future. 4-traders. Retrieved from http://www.4-traders.com/GENERAL-MOTORS-CORPORATIO-6873535/news/General-Motors- GM-Intensifies-Push-to-Train-Young-People-for-Jobs-of-Future-24672566/(link is external)

George Mason University. (2015, September 21). From Our Partners - Nanokrieg Beyond Blitzkrieg: Mindset to Fight the War on Terrorism by James Carlini. Retrieved from https://cip.gmu.edu/2015/09/21/from-our-partners-nanokrieg-beyond-blitzkrieg-mindset-to-fight-the-war-on-terrorism-by-james-carlini/(link is external)

George Washington University. (2014). Cybersecurity Education Workshop. Retrieved from https://research.gwu.edu(link is external)

Goldhammer, J., Weber, S., Cooper, B., Center for Long-Term Cybersecurity: UC Berkeley. (2016). CLTC Occasional White Paper Series Cyber Workforce Incubator. Retrieved from https://cltc.berkeley.edu/2017/04/06/cyber-workforce-incubator/(link is external)

Good, L., & Zanville, H. (2017, August 2). Four Lessons Learned from the National Connecting Credentials Campaign [Web log post]. Retrieved from http://connectingcredentials.org/four-lessons-learned-national-connecting-credentials-campaign/(link is external)

Goodman, M. (2016, July 28). How to Attract More Diversity in Cybersecurity Hiring [Blog]. RSAConference Where the world talks security. Retrieved from https://www.rsaconference.com/blogs/how-to-attract-more-diversity-in-cybersecurity-hiring(link is external)

Greater Phoenix Chamber Foundation Strengthening and Expanding the Talent Pipeline: Cyber Security [PDF]. (2016, August 22). Greater Phoenix Chamber Foundation- Cyber Security Workgroup. Retrieved from https://phoenixchamber.com/2016/10/27/cybersecurity-increasing-your-resiliency-building-the-talent-pipeline/(link is external)

Hacking the Skills Shortage, A study of the international shortage in cybersecurity skills Center for Strategic and International Studies [PDF]. (2016). Santa Clara, CA: INTEL Security.
Retrieved from https://www.mcafee.com/us/resources/reports/rp-hacking-skills-shortage.pdf(link is external)

Halvorsen, T., U.S. Department of Defense. (2015). A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the “National Center of Academic Excellence in Information Assurance Education Matters”. Washington, DC. Retrieved from https://www.cisse.info/pdf/2015/DoD%20942%20Report%20to%20Congress_FINAL.pdf(link is external)

Health Care Industry Cybersecurity Task Force. (2017, June 2). Report on Improving Cybersecurity in the Health Care Industry [PDF]. Retrieved from https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf

Helper, S., Noonan, R., Nicholson, J., Landon, D. (2016). The Benefits and Costs of Apprenticeship: A Business Perspective [PDF]. This resource was originally sourced from the Economics and Statistics Administration.

Herrmann, A., Rehm, K., Carlini, J., Schkeeper, P., Loken, L., Swanson, J., … Maltby, J. (2009, October). The CIP Report Center for Infrastructure Protection volume 8 number 4 [PDF].  Retrieved from https://cip.gmu.edu/homepage_slider/the-cip-report-2/(link is external)

Hernandez, P. (2016, December 1). Commission on Enhancing National Cybersecurity. Retrieved from https://www.nist.gov/cybercommission

Hoffman, L. J. (2010, December 15). Building the Cyber Security Workforce of the 21 Century: Report of a Workshop on Cyber Security Education and Workforce Development. Retrieved from https://cspri.seas.gwu.edu/sites/cspri.seas.gwu.edu/files/downloads/2010-3a_building_the_cyber_security_workforce_of_the_21st_century_1.pdf(link is external) 

Homeland Security Advisory Council Cyberskills Task Force Report Fall 2012 [PDF]. (2012). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov

Hrabowski, F. (2014, June 18). Institutional Change in Higher Education: Innovation and Collaboration. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/0161956X.2014.913440(link is external)

Impact of the NSF/ATE Cybersecurity Centers on the U.S. Cybersecurity Workforce. (2014, April 3). Retrieved from https://www.nationalcyberwatch.org/resource/impact-of-the-nsfate-cybersecurity-centers-on-the-u-s-cybersecurity-workforce-2/(link is external)

Information Security Scholarships | Center for Cyber Security and Education. (n.d.). Retrieved from https://iamcybersafe.org/research/(link is external)

Internet Security Education. (n.d.). Retrieved from https://iamcybersafe.org/(link is external)

Investing in a thriving Tech workforce pipeline for LA. (2016). Retrieved from https://data.lacity.org/stories/s/LA-Tech-Talent-Pipeline/x899-9vc5(link is external)

ISACA Trust In, and Value From, Information Systems. (2017). Retrieved from https://www.isaca.org/Pages/default.aspx?cid=1000270&Appeal=SEM&gclid=CJ-zyeSsutQCFU5MDQodtfMNYg(link is external)

It's not where you start – it's how you finish: Addressing the cybersecurity skills gap with a new-collar approach. (2017, March 10). Retrieved from https://www-935.ibm.com/services/us/gbs/thoughtleadership/newcollarjobs/(link is external)

Jackson Higgins, K. (2017, August 4). What Women in Cybersecurity Really Think About Their Careers. Retrieved from https://www.darkreading.com/careers-and-people/what-women-in-cybersecurity-really-think-about-their-careers/d/d-id/1329560?elq_mid=79625&elq_cid=22707212&_mc=NL_DR_EDT_DR_daily_20170805&cid=NL_DR_EDT_DR_daily_20170805&elqTrackId=a3e756da49cd4f849448473f26592217&elq=010efde8dd9a4f538d7540a896447a41&elqaid=79625&elqat=1&elqCampaignId=27509(link is external)

Jenkins, J. (2016, June). What Do You Want to Be? AARP Real Possibilities. Retrieved form http://www.aarp.org/politics-society/advocacy/info-2016/your-next-phase-life-reimagined-jenkins.html(link is external)

Johnston, R. (2017, July 24). California groups collaborate on cybersecurity education program. Retrieved from https://edscoop.com/(link is external)

Jones, E. (2016, January 14). UK Government gets serious on developing security skills in 2016. ITProPortal. Retrieved from http://www.itproportal.com/2016/01/14/uk-government-gets-serious-developing-security-skills-in-2016/(link is external)

K-12 Computer Science Framework. (n.d.). Retrieved from https://k12cs.org/(link is external)

K-12 Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/k-12-sub-working-group

King, S. (2017). A Model for a National Cybersecurity Policy. Retrieved from https://www.linkedin.com/pulse/model-national-cybersecurity-policy-steve-king(link is external)

Larson, R., Xue, Y. (2015, May). STEM crisis or STEM surplus? Yes and yes. Monthly Labor Review Bureau of Labor Statistics. Retrieved from https://www.bls.gov/opub/mlr/2015/article/stem-crisis-or-stem-surplus-yes-and-yes.htm

Libicki, M., Senty, D., Pollak, J. (n.d.). Hackers Wanted. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf(link is external)

Linthicum, S. (2017). Driving an effective cybersecurity apprentice program (Part 1). Certification Magazine. Retrieved from https://www.certmag.com/articles/driving-effective-cybersecurity-apprentice-program-part-1(link is external)

Linthicum, S. (2014). Formal ICT apprenticeship programs: Why not in the USA? Go Certify. Retrieved from http://www.gocertify.com/articles/formal-ict-apprenticeship-programs-why-not-in-the-usa.html(link is external)

List of Cybersecurity Education and Training Providers. (n.d.). Retrieved from http://cybersecurityventures.com/cybersecurity-education/(link is external)

List of Master of Science (M.S.) in Cybersecurity Degree Programs. (2017). Retrieved from http://cybersecurityventures.com/cybersecurity-university-masters-degree-programs/(link is external)

Lumina Foundation Cigna Accenture. (2016, April 22). Talent Investments Pay Off (Cigna) Cigna Realizes Return on Investment from Tuition Benefits. Retrieved from https://www.luminafoundation.org/resources/talent-investments-pay-off(link is external)

Lyngaas, S. (2015, August 14). A virtual community of cyber talent. FCW The Business of Federal Technology. Retrieved from https://fcw.com/articles/2015/08/14/virtual-cyber-talent.aspx(link is external)

Mack, E. (2011, August 04). Top 5 Potential Cyber-Enemies for the United States. Retrieved from http://www.pcworld.com/article/237298/top_5_potential_cyber_enemies_for_the_united_states.html(link is external)

Marks, J. (2017, March 02). Shoddy U.S. Cyber Deterrence Policy Emboldens Adversaries, Lawmakers Say. Retrieved from http://www.nextgov.com/cybersecurity/2017/03/shoddy-us-cyber-deterrence-policy-emboldens-adversaries-lawmakers-say/135853/(link is external)

McGettrick, A. (2013, August 30). Association for Computing Machinery: Toward Curricular Guidelines for Cybersecurity. Retrieved from https://www.semanticscholar.org/(link is external)

Miller, J. (2016). First-ever cyber workforce strategy aims to grow pipeline of skills. Retrieved from https://federalnewsradio.com/cybersecurity/2016/07/first-ever-cyber-workforce-strategy-aims-grow-pipeline-skills/(link is external)

Morgan, S. (2017, July 20). Great big list of cybersecurity resources. Retrieved from http://www.csoonline.com/article/3209670/it-careers/great-big-list-of-cybersecurity-resources.html(link is external)

Morgan, S. (2017, June 22). Cybersecurity job market to suffer severe workforce shortage 10 facts, figures and statistics summarize the cybersecurity labor market. CSO from IDG. Retrieved from http://www.csoonline.com/article/3201974/it-careers/cybersecurity-job-marketstatistics.html(link is external)

Morgan, S. (2017, May 31). Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by 2021. Retrieved from http://cybersecurityventures.com/jobs/(link is external)

Morgan, S. (2017, January 17). List of Women in Cybersecurity Associations to Join Now. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/(link is external)

Morgan, S. (2016, April 07). African Americans Underrepresented In The Cybersecurity Field. Retrieved from https://www.forbes.com/sites/stevemorgan/2016/04/07/african-americans-underrepresented-in-the-cybersecurity-field/#18a07b3615c9(link is external)

National Centers of Academic Excellence Cyber Defense. (2016, May 3). Retrieved from https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/

National Cyberwatch Center. (n.d.). National Cyberwatch Center Curriculum. Retrieved from https://www.nationalcyberwatch.org/programs-resources/curriculum/(link is external)

National Institute of Standards and Technology (NIST), Baldrige Performance Excellence Program, Applied Cybersecurity Division (ITL NIST). (2017). Baldrige Cybersecurity Excellence Builder Key questions for improving your organization’s cybersecurity performance. Retrieved from https://www.nist.gov/baldrige

National Institute of Standards and Technology (NIST). (2017, August). Executive Order on Cybersecurity Workforce Request For Information Responses. Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/resources/executive-order-13800/request-information/rfi-responses

Native Girls Code, helping diversify STEM. (2017, April 5). Retrieved from https://www.uwb.edu/news/april-2017/native-girls-code(link is external)

Neal, J. (2016, March 11). Can we hire (and keep) the talent for digital government? Federal News Radio. Retrieved from https://federalnewsradio.com/commentary/2016/03/can-we-hire-and-keep-the-talent-for-digital-government/(link is external)

Newhouse, B., Keith, S., Scribner, B., Witte, G. (2016, November). Draft NIST Special Publication 800-181 NICE Cybersecurity Workforce Framework (NCWF) [PDF]. NIST National Institute of Standards and Technology U.S. Department of Commerce. Retrieved from http://csrc.nist.gov/publications/drafts/800-181/sp800_181_draft.pdf

NICCS Education and Training Catalog. (n.d.). Retrieved from https://niccs.us-cert.gov/training/search#

NICE Challenge Project Enabling the Cybersecurity Workforce of Tomorrow. (n.d.). Retrieved from https://nice-challenge.com/(link is external)

NICE led by National Institute for Standards and Technology (NIST) U.S. Department of Commerce. (2016). Cybersecurity Games: Building Tomorrow’s Workforce [PDF]. Retrieved from https://www.nist.gov/file/362871

NICERC Curricula. (2017). Retrieved from https://nicerc.org/curricula/(link is external)

Oesch, T. (2017, May 15). Serious Games for Serious Topics: Training Cybersecurity Professionals Using AI-Powered Games. Retrieved from https://www.trainingindustry.com/it-training/articles/serious-games-for-serious-topics-training-cybersecurity-professionals-using-ai-powered-games.aspx(link is external)

Office of Personal Management. (2016). Compensation Flexibilities to Recruit and Retain Cybersecurity Professionals. Retrieved from https://www.opm.gov/policy-data-oversight/pay-leave/reference-materials/handbooks/compensation-flexibilities-to-recruit-and-retain-cybersecurity-professionals.pdf

Park, M. (2017, May 8). Chance for women and minorities to enter the trillion dollar cybersecurity field Jobs gap opens opportunity for a more diverse workforce. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/(link is external)

Parton, B. (2017, March 23). AF Series #1: Moving Apprenticeship Forward. Retrieved from https://www.newamerica.org(link is external)

Paulsen, C., McDuffie, E., Newhouse, W., and Toth, P. (2012, June 26). NICE: Creating a Cybersecurity Workforce and Aware Public. Retrieved from http://ieeexplore.ieee.org/abstract/document/6226542/(link is external)

Petrella, E. (2017, April 26). Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/regional-alliances-and-multistakeholder-partnerships-stimulate-ramps

Petrella, E. (2017, April 19). NICE Interagency Coordinating Council (ICC). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/interagency-coordinating-council

Pomerleau, M. (2016, February 4). Report outlines cyber activity from top U.S. adversaries. Retrieved from https://defensesystems.com/articles/2016/02/04/crowdstrike-cyber-report-nation-states.aspx(link is external)

Pound, G. (2017, June 22). STEM verity welcomes important guests. The Union-Recorder. Retrieved from http://www.unionrecorder.com/news/stemversity-welcomes-important-guests/article_fcd96092-56b5-11e7-85cd-831ef80e4901.html(link is external)

Prebil, M. (2017, June 16). Fresh Ideas for Growing Apprenticeship. Retrieved from https://www.newamerica.org(link is external)

Prebil, M. (2017). Teach Cybersecurity with Apprenticeship Instead: Governments, private industry, and tech culture can all benefit from a cyber workforce built on quality apprenticeships. New America. Retrieved from https://www.newamerica.org/education-policy/edcentral/teach-cyber-apprenticeship-instead/(link is external)  

Presidential Executive Order Expanding Apprenticeships in America. (2017, June 15). Retrieved from https://www.whitehouse.gov/the-press-office/2017/06/15/presidential-executive-order-expanding-apprenticeships-america

Professional Development. (2016). Retrieved from https://nicerc.org/pd/(link is external)

Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making. (2013). Retrieved from https://www.nap.edu/read/18446/chapter/5(link is external)

Reauthorization of Carl D. Perkins Vocational and Technical Education Act. (2007, March 16). Retrieved from https://www2.ed.gov/policy/sectech/leg/perkins/index.html

Recruiting and Retaining Cybersecurity Ninjas. (2016, October 19). Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas(link is external)

Reed, D., Yung-Hsu Liu, A., Kleinman, R., Mastri, A., Reed, D., Sattar, S., Zeigler, J. (2012, July 25). An Effectiveness Assessment and Cost-Benefit Analysis of Registered Apprenticeship in 10 States. Retrieved from https://wdr.doleta.gov/research/fulltext_documents/etaop_2012_10.pdf

Reeder, F., Timlin, K., Center for Strategic and International Studies (CSIS) Strategic Technologies Program. (2016). Recruiting and Retaining Cybersecurity Ninjas. Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas(link is external)

Reinhold, M.D. (2016). Memo. [OPM; CHCO Council]. Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act

Requirements of the Federal Cybersecurity Workforce Assessment Act. (2016, August 01). Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act

Robbins, G. (2017, April 17). Tons of $80,000 entry-level jobs going ignored. The San Diego Union Tribune. Retrieved from http://www.sandiegouniontribune.com/news/cyber-life/sd-me-connected-highered-20170417-story.html(link is external)

Robinson, H. (2017, June 19). Teens join the cyber profession. Retrieved from http://www.csbj.com/2017/06/16/teens-join-cyber-profession/(link is external)

Saporito, L., Blute, T., National Governors Association (2014). Federal Cybersecurity Programs: A Resource Guide. Retrieved from https://www.nga.org(link is external)

Scholarships for Women Studying Information Security. (n.d.). Retrieved from http://cra.org/cra-w/scholarships-and-awards/scholarships/swsis/(link is external)

Scorsone, G. (2017, July 3). Four Things You Must Do to Retain Top Tech Talent. Information Week. Retrieved from http://www.informationweek.com/strategic-cio/team-building-and-staffing/four-things-you-must-do-to-retain-top-tech-talent/a/d-id/1329241(link is external)

Securing Our Future: Closing the Cybersecurity Talent Gap October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness [PDF]. (2016). Sterling, VA: Raytheon Intelligence, Information and Services. Retrieved from http://www.raytheoncyber.com/rtnwcm/groups/corporate/documents/content/rtn_335212.pdf(link is external)

Senate - Homeland Security and Governmental Affairs. (2015). S.2007: Federal Cybersecurity Workforce. Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text

Shark, A., Metzanbaum, S., Barquin, R., Wennergren, D. (2015, August). Increasing the Effectiveness of the Federal Role in Cybersecurity Education [Draft PDF]. National Academy of Public Administration.  Retrieved from https://www.napawash.org/uploads/Academy_Studies/Cyber-CAE-Report-FINAL…(link is external)

Shinkman, P. (2016, September 29). America Is Losing the Cyber War. US News. Retrieved from https://www.usnews.com/news/articles/2016-09-29/cyber-wars-how-the-us-stacks-up-against-its-digital-adversaries(link is external)

Snell, E. (2017, May 03). Addressing the Cybersecurity Skills Gap with Improved Training. Retrieved from https://healthitsecurity.com/news/addressing-the-cybersecurity-skills-gap-with-improved-training(link is external)

State of Cybersecurity Implications for 2016 An ISACA and RSA Conference Survey [PDF]. (2016). RSA Conference | Where the world talks security and ISACA. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf(link is external)

Steinberg, S., Schwartz, B. (2014, July 14). The Bottom Line: Apprenticeships Are Good for Business. Center for American Progress. Retrieved from https://www.americanprogress.org/issues/economy/news/2014/07/14/93768/the-bottom-line-apprenticeships-are-good-for-business/(link is external)

Strategic Plan. (2017, May 05). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/strategic-plan

Stratford, M. (2017, August 02). Congress passes $3B expansion of GI Bill education benefits. Retrieved from http://www.politico.com/story/2017/08/02/veterans-defense-gi-bill-241266(link is external)

The Comprehensive National Cybersecurity Initiative [PDF]. (n.d.). Executive Office of the President of the United States. Retrieved from http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-034.pdf(link is external)

The National Strategy to Secure Cyberspace [PDF]. (2003, February). US Cert. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf

The Role of Minorities and Women in Cybersecurity. (2016, April 12). Retrieved from http://www.nationalcybersecurityinstitute.org(link is external)

The 2015 (ISC)2 Global Information Workforce Study [PDF]. (2015). (ISC)². Retrieved from https://www.boozallen.com/content/dam/boozallen/documents/Viewpoints/2015/04/frostsullivan-ISC2-global-information-security-workforce-2015.pdf(link is external)

University of Maryland Center for Advanced Study of Language. (2016, August). Assessing aptitude for cyber operations Identifying potential candidates for the U.S. Air Force.  Retrieved from https://www.casl.umd.edu/wp-content/uploads/2017/04/DO0080_FactSheet_082016.pdf(link is external)

University System of Maryland. (2011). Report of the Cyber Security Task Force [PDF]. Retrieved from https://www.usmd.edu(link is external)

University of Texas at San Antonio’s (UTSA) Center for Infrastructure Assurance and Security (CIAS). (2017, August 2). Response to the NIST RFI Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: Workforce Development [PDF]. Retrieved from https://www.nist.gov/sites/default/files/documents/2017/08/02/university_of_texas_at_san_antonio.pdf

Urias, V., Leeuwen, B., Stout, W., & Lin, H. (2017, June 8). Dynamic cybersecurity training environments for an evolving cyber workforce. Retrieved from http://ieeexplore.ieee.org/document/7943509/(link is external)

U.S. Department of Defense . (n.d.). Troops to Teachers . Retrieved from http://www.dodea.edu/Offices/HR/employment/troopsToTeachers.cfm(link is external)

U.S Department of Homeland Security . (2016, September 20). Cybersecurity Education & Career Development. Retrieved from https://www.dhs.gov/topic/cybersecurity-education-career-development

U.S. Department of Homeland Security . (2015, November 19). Academic Engagement Results. Retrieved from https://www.dhs.gov/academic-engagement-results

U.S. Department of Homeland Security. (2015, November 12). Academic Engagement Overview. Retrieved from https://www.dhs.gov/academic-engagement-overview

U.S. Department of Homeland Security . (n.d.). Homeland Security Careers. Retrieved from https://www.dhs.gov/homeland-security-careers/hiring-event

U.S. Department of Homeland Security . (n.d.). Homeland Security Careers for Students. Retrieved from https://www.dhs.gov/homeland-security-careers/students

U.S. Department of Homeland Security . (n.d.). Student Opportunities at the Department of Homeland Security [PDF]. Retrieved from https://www.dhs.gov/homeland-security-careers/students

U.S. Department of Labor. (2017, May 11). Shareables: Get the Facts On Apprenticeship. Retrieved from https://www.dol.gov

U.S. Department of Labor Employment and Training Administration ApprenticeshipUSA. (2016). Data and Statistics. Retrieved from https://www.doleta.gov/oa/data_statistics.cfm

U.S. Department of Labor. (n.d.). Apprenticeship. Retrieved from https://www.dol.gov/apprenticeship/index.htm

Virginia Cyber Commission. (2015). Commonwealth of Virginia Cyber Security Commission “Threats and Opportunities”. Retrieved from https://www.virginia.gov/

Waterman, S. (2017, June 12). Recruitment and retention of 'cyber ninjas' doesn't have to be a dark art, report says. Retrieved from https://www.cyberscoop.com/systems-integrators-top-cybersecurity-recruitment-talent-sans-institute-report-workforce/(link is external)

Watson, E. (2015, March 12). Black Colleges at the Forefront of Cybersecurity Issues. Retrieved from http://www.huffingtonpost.com/elwood-d-watson/black-colleges-at-the-forefront-of-cybersecurity-issues_b_6852334.html(link is external)

Welcome to the CAE Community. (n.d.). Retrieved from https://www.caecommunity.org/(link is external)

Whitehouse, S., McCaul, M., Evans, K., Bhalotra, S., Center for Strategic and International Studies (CSIS) Cyber Policy Task Force. (2017). From Awareness to Action a Cybersecurity Agenda for the 45th President. 

Why IT Matters to Higher Education: Educause Review home page. (n.d.). Retrieved from http://er.educause.edu/ (link is external)

Williams, B. D. (2017, May 26). Profiles in cyber: Understanding the US's major adversaries in cyberspace. Retrieved from https://www.fifthdomain.com(link is external)

Women in Cybersecurity. (n.d.). Retrieved from https://www.csc.tntech.edu/wicys/(link is external)

Women in Security and Privacy (WISP) Advancing Women to Lead the Future of Privacy and Security. (n.d.). Retrieved from http://www.wisporg.com(link is external)

Women’s Society of Cyberjutsu . (n.d.). Retrieved from http://womenscyberjutsu.org/(link is external)

Wong, C. (2017). Women in Cybersecurity A PROGRESSIVE MOVEMENT. Retrieved from https://resource.cobalt.io/hubfs/2017%20Women%20in%20Cybersecurity%20A%20Progressive%20Movement.pdf(link is external)

Workforce Management Sub Working Group. (2017, July 10).  Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/workforce-management-sub-working-group

Yasaitis, C., LeGrand, M. (2016, July 5). Cybersecurity: A Top Priority for Airline Boards. Russell Reynolds Associates. Retrieved from http://www.russellreynolds.com/newsroom/cybersecurity-a-top-priority-for-airline-boards(link is external)

Zadelhoff, M. V. (2017, May 4). Cybersecurity Has a Serious Talent Shortage. Here's How to Fix It. Retrieved from https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it(link is external)

2009 Cyberspace Policy Review. (2015, August 10). Retrieved from https://www.dhs.gov/publication/2009-cyberspace-policy-review

(ISC)² Study: Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate. (2015, April 17). Retrieved from http://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html(link is external)

Created December 13, 2017, Updated December 9, 2024