The following Reference List contains cybersecurity articles, strategies, reports, programs, and efforts that were compiled and consulted as part of an environmental scan to inform the assessment of current cybersecurity education and training efforts.
Please note: These resources were referenced in 2017. Some of the original links may no longer be working and/or accurate.
References
A Cybersecurity Agenda for the 45th President. (2017, January 5). Retrieved from https://www.csis.org/news/cybersecurity-agenda-45th-president
An Examination of the Cybersecurity Labor Market. (n.d.). Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf
Applications Now Available for City Colleges of Chicago’s New Cyber Security “Boot Camp”. (2017, March 18). Retrieved from http://www.ccc.edu/news/Pages/Applications-Now-Available-for-City-Colleges-of-Chicagos-New-Cyber-Security-Boot-Camp-.aspx
ApprenticeshipUSA Investments. (2017, June 22). Retrieved from https://www.dol.gov/featured/apprenticeship/grants
Assante, M., Tobey, D. (2011, February 4). Enhancing the Cybersecurity Workforce. Retrieved from http://ieeexplore.ieee.org/document/5708280/
Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text
ATE Centers. (n.d.). Retrieved from http://www.atecenters.org/
ATE Centers and National Science Foundation. (n.d.). ATE Centers Impact Report. Retrieved from http://www.atecenters.org/wp-content/uploads/PDF/ATEIMPACT_2016-17.pdf
ATE Centers and National Science Foundation. (n.d.). ATE Programs and Overview. Retrieved from http://www.atecenters.org/wp-content/uploads/2016/07/ATE_Overview_2016.pdf
AUSTRALIA’S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity [PDF]. (n.d.). Retrieved from https://cybersecuritystrategy.pmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf
Baltimore Cyber Range and Cyberbit Open New Cybersecurity Training and Simulation Center. (2017, August 3). Retrieved from https://www.cyberbit.com
Bessen, J. (2014, August 25). Employers Aren’t Just Whining – the “Skills Gap” is Real. Harvard Business Review. Retrieved from https://hbr.org/2014/08/employers-arent-just-whining-the-skills-gap-is-real
Best in Class Strategies for Entry-Level Employee Retention Prepared for 100K [PDF]. (2016, October). FSG Reimagining Social Change. Retrieved from https://www.100kopportunities.org/2016/10/14/best-in-class-strategies-for-entry-level-employee-retention/
Best Places to Work for Cyber Ninjas. (2017, May). Retrieved from https://www.sans.org/best-places-to-work-for-cyber-ninjas?ref=195285
Bojanova, I., Vaulx, F., Zettsu, K., Simmon, E., Sowe, S. (2016, January 21). Cyber-Physical-Human Systems Putting People in the Loop. IT Professional. Retrieved from http://ieeexplore.ieee.org/document/7389271/
Burning Glass Technologies. (2015). Job Market Intelligence: Cybersecurity Jobs, 2015 [PDF]. Retrieved from https://ahed.assembly.ca.gov/sites/ahed.assembly.ca.gov/files/hearings/Cybersecurity_Jobs_Report_2015.pdf
Canadian Apprenticeship Forum Forum Canadien Sur I’Apprentissage. (2009, June). It Pays to Hire an Apprentice: Calculating the Return on Training Investment for Skilled Trades Employers in Canada A Study of 16 Trades Phase II Final Report. Retrieved from https://www.nsapprenticeship.ca/sites/default/files/files/CAF-pays.pdf
Carlini, J. (2017, August 6). Geneva Convention in Cyberwarfare? Don't Count on It. Retrieved from https://intpolicydigest.org/2017/08/06/geneva-convention-cyberwarfare-don-t-count/
Carlini, J. (2017, August 06). Preparing for Nanokrieg: Electronic Wars Being Won and Lost in Microseconds. Retrieved from https://www.jstor.org/stable/26497116
Carlini, J. (2016, April 30). Nanokrieg: The Next Trillion Dollar War | @CloudExpo #Cloud #Security. Retrieved from https://icloud.pe/blog/nanokrieg-the-next-trillion-dollar-war-cloudexpo-cloud-security/
Carsen, D. (2017, July 31). High School Students Track Real Cybercriminals at UAB. Retrieved from https://news.wbhm.org/feature/2017/high-school-students-track-real-cybercriminals-uab/
Center for Long-Term Cybersecurity, UC Berkeley. (2016). Cybersecurity Policy Ideas for a New Presidency. Retrieved from https://cltc.berkeley.edu/2016/11/18/livestream-new-report-and-panel-on-cybersecurity-policy-ideas-for-a-new-presidency/
Charney, D. (2017, February 3). 6 Talent Trends to Watch in 2017. Material Handling and Logistics (MH&L). Retrieved from http://mhlnews.com/salary-survey/6-talent-trends-watch-2017
Clabaugh, J. (2017, June 22). The right stuff: DC area companies ready to hire, struggle to fill IT jobs. WTOP. Retrieved from http://wtop.com/business-finance/2017/06/the-right-stuff-dc-area-companies-struggle-to-fill-it-jobs-more-to-open/
Coastline Community College. (2016). California Cybersecurity Apprenticeship Project (CCAP). Retrieved from https://drive.google.com/file/d/0B1wjRZl99PuZektWS3k3SEVKVms/view
Collegiate Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/collegiate-sub-working-group
Commission on Cybersecurity for the 44th Presidency. (2015, September 28). Retrieved from https://www.csis.org/programs/technology-policy-program/cybersecurity/other-projects-cybersecurity/commission
Communications Security, Reliability and Interoperability Council. (2017). Final Report- Cybersecurity Workforce Development Best Practices Recommendations. Retrieved from https://www.fcc.gov/files/csric5-wg7-finalreport031517pdf
Competitions Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/competitions-sub-working-group
CompTIA. (n.d.). Retrieved from https://www.comptia.org
Concanon, K., Williams, R., Feehan, D., Uvin, J., Yudin, M., Foster, D., … Monje, C. (2016). Federal Partnership regarding career pathways [PDF letter]. Retrieved from https://careerpathways.workforcegps.org/~/media/WorkforceGPS/careerpathways/Files/Career%20Pathways%20Joint%20Letter%202016.pdf
Conklin, W., Cline, R., & Roosa, T. (2014, March 10). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. Retrieved from http://ieeexplore.ieee.org/document/6758852/
Control-Alt-Hack(R). (n.d.). Retrieved from http://www.controlalthack.com/
Costanzo, J. (2017). Hampton Roads Cybersecurity Education, Workforce, and Economic Development Alliance (HRCyber) Mid-Project Report “Bridging the cybersecurity talent gap in Hampton Roads” [PDF]. Retrieved from http://securitybehavior.com/hrcyber/doc/HRCyber%20Mid-Project%20Report.pdf
Consortium Enabling Cybersecurity Opportunities and Research. (n.d.). K-20 Cybersecurity - CECOR Project . Retrieved from http://cset.nsu.edu/programs/k20cybersecurity
Cyberbit Protecting a New Dimension. (2017). Cyberbit Range The First Hyper-Realistic Simulation Platform for Cyber Security Experts [PDF]. Retrieved from https://www.infosecurityeurope.com/__novadocuments/362748?v=636315473978100000
Cyberbit Protecting a New Dimension. (n.d.). Retrieved from https://www.cyberbit.com/
CyberCorps ®: Scholarship for Service. (n.d.). Retrieved from https://www.sfs.opm.gov/
Cybersecurity Enhancement Act of 2014, Pub. L. No, 113-274, 128 Stat. 2971. (2014). Retrieved from https://www.congress.gov/bill/113th-congress/senate-bill/1353/text
CYBERSECURITY WORKFORCE DEVELOPMENT TOOLKIT How to Build a Strong Cybersecurity Workforce [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://niccs.us-cert.gov/workforce-development/cybersecurity-workforce-development-toolkit
Cyber Security Capital We help cyber security professionals succeed. (n.d.). Retrieved from http://cybersecuritycapital.com
Cyberseek. (n.d.). Retrieved from http://cyberseek.org/
Cyber Competitions. (2017, May 19). Retrieved from https://niccs.us-cert.gov
Cyber Discovery | NICERC. (2016). Retrieved from https://nicerc.org/events/cyber-discovery/
Cyber Innovation Center. (2016). Retrieved from https://cyberinnovationcenter.org/
Cyber IN-security Strengthening the Federal Cybersecurity Workforce [PDF]. (2009, July). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org
Cyber IN-security II Closing the Federal Talent Gap [PDF]. (2015, April). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org
Cyber Space Policy Review Assuring a Trusted and Resilient Information and Communications Infrastructure [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov
Dana, J. (2017, April 8). The Utter Uselessness of Job Interviews. The New York Times. Retrieved from https://www.nytimes.com/2017/04/08/opinion/sunday/the-utter-uselessness-of-job-interviews.html
Department of Homeland Security. (2017). National Cyber Security Awareness Month October 2017 [PDF]. Retrieved from https://www.dhs.gov/sites/default/files/publications/NCSAM%202017%20Themes%20One%20Pager-%20508%20compliant.pdf
Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016). Memorandum for Heads of Executive Departments and Agencies. Retrieved from http://www.ncsl.org/documents/statefed/Federal_Cybersecurity_WorkforceStrategy.pdf
Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016, July 12). Strengthening the Federal Cybersecurity Workforce [Blog]. The White House President Barack Obama. Retrieved from https://obamawhitehouse.archives.gov/blog/2016/07/12/strengthening-federal-cybersecurity-workforce
Economics and Statistics Administration U.S. Department of Commerce. (2016, November 16). The Benefits and Costs of Apprenticeships: A Business Perspective. This resource was originally sourced from the Economics and Statistics Administration.
EducationHQ News Team. (2017, July 26). Cyber Teacher Professional Learning Series Comes To Australia. Retrieved from https://au.educationhq.com/news/40906/cyber-teacher-professional-learning-series-comes-to-australia/?utm_medium=email&utm_campaign=EducationWeek Australia - Weekend test&utm_content=EducationWeek Australia - Weekend test%2BCID_ef0e00fb43ab4c60c283d7f99a5dba28&utm_source=EducationHQ Campaigns&utm_term=Cyber Teacher Professional Learning Series Comes To Australia
Eichensehr, M. (2017, August 3). Baltimore Cyber Range training facility opens at Power Plant Live. Retrieved from https://www.bizjournals.com/baltimore/news/2017/08/03/baltimore-cyber-range-training-facility-opens-at.html
Elbit Systems of America. (n.d.). Retrieved from http://www.elbitsystems-us.com
Electronic Technology Associates. (2017). Capabilities Statement.
Elsey, B., Lanier, L., Jessie, S. (2015). Career Pathways Toolkit: A Guide for System Development [PDF]. Retrieved from https://wdr.doleta.gov/directives/attach/TEN/TEN_17-15_Attachment_Acc.pdf
Executive Women's Forum. (n.d.). Retrieved from http://www.ewf-usa.com/
FACT SHEET: Cybersecurity National Action Plan. (2016, February 9). Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan
Federal Communications Commission. (2016, January 29). Task Force on Optimal PSAP Architecture (TFOPA) An FCC Federal Advisory Committee Final Adopted Report. Retrieved from https://apps.fcc.gov/edocs_public/attachmatch/DA-16-179A2.pdf
Federal Cybersecurity Workforce Assessment Act, S.2007, 114th Congress. (2015). Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/actions
FISSEA. (n.d.). FISSEA: Federal Information Systems Security Educators’ Association. Retrieved from FISSEA | NIST
Foote Partners, LLC Foote Research Group. (2016). Cash premiums earned by 65,082 IT professionals, specifically earmarked to 854 certified and noncertified IT skills, rise in 2016; IT security certifications post the highest gains over last 3,6, and 12 months among all certifications categories; For noncertified tech skills, Applications Development related skills continue to beat all others, led by not Big Data and Cloud skills [PDF]. Retrieved from http://www.footepartners.com/fp_pdf/FooteNewsrelease_2Q16ITSkillsTrends_09182016.pdf
GenCyber. (n.d.). Retrieved from https://www.gen-cyber.com/
General Motors. (2017, June 28). General Motors: GM Intensifies Push to Train Young People for Jobs of Future. 4-traders. Retrieved from http://www.4-traders.com/GENERAL-MOTORS-CORPORATIO-6873535/news/General-Motors- GM-Intensifies-Push-to-Train-Young-People-for-Jobs-of-Future-24672566/
George Mason University. (2015, September 21). From Our Partners - Nanokrieg Beyond Blitzkrieg: Mindset to Fight the War on Terrorism by James Carlini. Retrieved from https://cip.gmu.edu/2015/09/21/from-our-partners-nanokrieg-beyond-blitzkrieg-mindset-to-fight-the-war-on-terrorism-by-james-carlini/
George Washington University. (2014). Cybersecurity Education Workshop. Retrieved from https://research.gwu.edu
Goldhammer, J., Weber, S., Cooper, B., Center for Long-Term Cybersecurity: UC Berkeley. (2016). CLTC Occasional White Paper Series Cyber Workforce Incubator. Retrieved from https://cltc.berkeley.edu/2017/04/06/cyber-workforce-incubator/
Good, L., & Zanville, H. (2017, August 2). Four Lessons Learned from the National Connecting Credentials Campaign [Web log post]. Retrieved from http://connectingcredentials.org/four-lessons-learned-national-connecting-credentials-campaign/
Goodman, M. (2016, July 28). How to Attract More Diversity in Cybersecurity Hiring [Blog]. RSAConference Where the world talks security. Retrieved from https://www.rsaconference.com/blogs/how-to-attract-more-diversity-in-cybersecurity-hiring
Greater Phoenix Chamber Foundation Strengthening and Expanding the Talent Pipeline: Cyber Security [PDF]. (2016, August 22). Greater Phoenix Chamber Foundation- Cyber Security Workgroup. Retrieved from https://phoenixchamber.com/2016/10/27/cybersecurity-increasing-your-resiliency-building-the-talent-pipeline/
Hacking the Skills Shortage, A study of the international shortage in cybersecurity skills Center for Strategic and International Studies [PDF]. (2016). Santa Clara, CA: INTEL Security.
Retrieved from https://www.mcafee.com/us/resources/reports/rp-hacking-skills-shortage.pdf
Halvorsen, T., U.S. Department of Defense. (2015). A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the “National Center of Academic Excellence in Information Assurance Education Matters”. Washington, DC. Retrieved from https://www.cisse.info/pdf/2015/DoD%20942%20Report%20to%20Congress_FINAL.pdf
Health Care Industry Cybersecurity Task Force. (2017, June 2). Report on Improving Cybersecurity in the Health Care Industry [PDF]. Retrieved from https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf
Helper, S., Noonan, R., Nicholson, J., Landon, D. (2016). The Benefits and Costs of Apprenticeship: A Business Perspective [PDF]. This resource was originally sourced from the Economics and Statistics Administration.
Herrmann, A., Rehm, K., Carlini, J., Schkeeper, P., Loken, L., Swanson, J., … Maltby, J. (2009, October). The CIP Report Center for Infrastructure Protection volume 8 number 4 [PDF]. Retrieved from https://cip.gmu.edu/homepage_slider/the-cip-report-2/
Hernandez, P. (2016, December 1). Commission on Enhancing National Cybersecurity. Retrieved from https://www.nist.gov/cybercommission
Hoffman, L. J. (2010, December 15). Building the Cyber Security Workforce of the 21 Century: Report of a Workshop on Cyber Security Education and Workforce Development. Retrieved from https://cspri.seas.gwu.edu/sites/cspri.seas.gwu.edu/files/downloads/2010-3a_building_the_cyber_security_workforce_of_the_21st_century_1.pdf
Homeland Security Advisory Council Cyberskills Task Force Report Fall 2012 [PDF]. (2012). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov
Hrabowski, F. (2014, June 18). Institutional Change in Higher Education: Innovation and Collaboration. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/0161956X.2014.913440
Impact of the NSF/ATE Cybersecurity Centers on the U.S. Cybersecurity Workforce. (2014, April 3). Retrieved from https://www.nationalcyberwatch.org/resource/impact-of-the-nsfate-cybersecurity-centers-on-the-u-s-cybersecurity-workforce-2/
Information Security Scholarships | Center for Cyber Security and Education. (n.d.). Retrieved from https://iamcybersafe.org/research/
Internet Security Education. (n.d.). Retrieved from https://iamcybersafe.org/
Investing in a thriving Tech workforce pipeline for LA. (2016). Retrieved from https://data.lacity.org/stories/s/LA-Tech-Talent-Pipeline/x899-9vc5
ISACA Trust In, and Value From, Information Systems. (2017). Retrieved from https://www.isaca.org/Pages/default.aspx?cid=1000270&Appeal=SEM&gclid=CJ-zyeSsutQCFU5MDQodtfMNYg
It's not where you start – it's how you finish: Addressing the cybersecurity skills gap with a new-collar approach. (2017, March 10). Retrieved from https://www-935.ibm.com/services/us/gbs/thoughtleadership/newcollarjobs/
Jackson Higgins, K. (2017, August 4). What Women in Cybersecurity Really Think About Their Careers. Retrieved from https://www.darkreading.com/careers-and-people/what-women-in-cybersecurity-really-think-about-their-careers/d/d-id/1329560?elq_mid=79625&elq_cid=22707212&_mc=NL_DR_EDT_DR_daily_20170805&cid=NL_DR_EDT_DR_daily_20170805&elqTrackId=a3e756da49cd4f849448473f26592217&elq=010efde8dd9a4f538d7540a896447a41&elqaid=79625&elqat=1&elqCampaignId=27509
Jenkins, J. (2016, June). What Do You Want to Be? AARP Real Possibilities. Retrieved form http://www.aarp.org/politics-society/advocacy/info-2016/your-next-phase-life-reimagined-jenkins.html
Johnston, R. (2017, July 24). California groups collaborate on cybersecurity education program. Retrieved from https://edscoop.com/
Jones, E. (2016, January 14). UK Government gets serious on developing security skills in 2016. ITProPortal. Retrieved from http://www.itproportal.com/2016/01/14/uk-government-gets-serious-developing-security-skills-in-2016/
K-12 Computer Science Framework. (n.d.). Retrieved from https://k12cs.org/
K-12 Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/k-12-sub-working-group
King, S. (2017). A Model for a National Cybersecurity Policy. Retrieved from https://www.linkedin.com/pulse/model-national-cybersecurity-policy-steve-king
Larson, R., Xue, Y. (2015, May). STEM crisis or STEM surplus? Yes and yes. Monthly Labor Review Bureau of Labor Statistics. Retrieved from https://www.bls.gov/opub/mlr/2015/article/stem-crisis-or-stem-surplus-yes-and-yes.htm
Libicki, M., Senty, D., Pollak, J. (n.d.). Hackers Wanted. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf
Linthicum, S. (2017). Driving an effective cybersecurity apprentice program (Part 1). Certification Magazine. Retrieved from https://www.certmag.com/articles/driving-effective-cybersecurity-apprentice-program-part-1
Linthicum, S. (2014). Formal ICT apprenticeship programs: Why not in the USA? Go Certify. Retrieved from http://www.gocertify.com/articles/formal-ict-apprenticeship-programs-why-not-in-the-usa.html
List of Cybersecurity Education and Training Providers. (n.d.). Retrieved from http://cybersecurityventures.com/cybersecurity-education/
List of Master of Science (M.S.) in Cybersecurity Degree Programs. (2017). Retrieved from http://cybersecurityventures.com/cybersecurity-university-masters-degree-programs/
Lumina Foundation Cigna Accenture. (2016, April 22). Talent Investments Pay Off (Cigna) Cigna Realizes Return on Investment from Tuition Benefits. Retrieved from https://www.luminafoundation.org/resources/talent-investments-pay-off
Lyngaas, S. (2015, August 14). A virtual community of cyber talent. FCW The Business of Federal Technology. Retrieved from https://fcw.com/articles/2015/08/14/virtual-cyber-talent.aspx
Mack, E. (2011, August 04). Top 5 Potential Cyber-Enemies for the United States. Retrieved from http://www.pcworld.com/article/237298/top_5_potential_cyber_enemies_for_the_united_states.html
Marks, J. (2017, March 02). Shoddy U.S. Cyber Deterrence Policy Emboldens Adversaries, Lawmakers Say. Retrieved from http://www.nextgov.com/cybersecurity/2017/03/shoddy-us-cyber-deterrence-policy-emboldens-adversaries-lawmakers-say/135853/
McGettrick, A. (2013, August 30). Association for Computing Machinery: Toward Curricular Guidelines for Cybersecurity. Retrieved from https://www.semanticscholar.org/
Miller, J. (2016). First-ever cyber workforce strategy aims to grow pipeline of skills. Retrieved from https://federalnewsradio.com/cybersecurity/2016/07/first-ever-cyber-workforce-strategy-aims-grow-pipeline-skills/
Morgan, S. (2017, July 20). Great big list of cybersecurity resources. Retrieved from http://www.csoonline.com/article/3209670/it-careers/great-big-list-of-cybersecurity-resources.html
Morgan, S. (2017, June 22). Cybersecurity job market to suffer severe workforce shortage 10 facts, figures and statistics summarize the cybersecurity labor market. CSO from IDG. Retrieved from http://www.csoonline.com/article/3201974/it-careers/cybersecurity-job-marketstatistics.html
Morgan, S. (2017, May 31). Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by 2021. Retrieved from http://cybersecurityventures.com/jobs/
Morgan, S. (2017, January 17). List of Women in Cybersecurity Associations to Join Now. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/
Morgan, S. (2016, April 07). African Americans Underrepresented In The Cybersecurity Field. Retrieved from https://www.forbes.com/sites/stevemorgan/2016/04/07/african-americans-underrepresented-in-the-cybersecurity-field/#18a07b3615c9
National Centers of Academic Excellence Cyber Defense. (2016, May 3). Retrieved from https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
National Cyberwatch Center. (n.d.). National Cyberwatch Center Curriculum. Retrieved from https://www.nationalcyberwatch.org/programs-resources/curriculum/
National Institute of Standards and Technology (NIST), Baldrige Performance Excellence Program, Applied Cybersecurity Division (ITL NIST). (2017). Baldrige Cybersecurity Excellence Builder Key questions for improving your organization’s cybersecurity performance. Retrieved from https://www.nist.gov/baldrige
National Institute of Standards and Technology (NIST). (2017, August). Executive Order on Cybersecurity Workforce Request For Information Responses. Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/resources/executive-order-13800/request-information/rfi-responses
Native Girls Code, helping diversify STEM. (2017, April 5). Retrieved from https://www.uwb.edu/news/april-2017/native-girls-code
Neal, J. (2016, March 11). Can we hire (and keep) the talent for digital government? Federal News Radio. Retrieved from https://federalnewsradio.com/commentary/2016/03/can-we-hire-and-keep-the-talent-for-digital-government/
Newhouse, B., Keith, S., Scribner, B., Witte, G. (2016, November). Draft NIST Special Publication 800-181 NICE Cybersecurity Workforce Framework (NCWF) [PDF]. NIST National Institute of Standards and Technology U.S. Department of Commerce. Retrieved from http://csrc.nist.gov/publications/drafts/800-181/sp800_181_draft.pdf
NICCS Education and Training Catalog. (n.d.). Retrieved from https://niccs.us-cert.gov/training/search#
NICE Challenge Project Enabling the Cybersecurity Workforce of Tomorrow. (n.d.). Retrieved from https://nice-challenge.com/
NICE led by National Institute for Standards and Technology (NIST) U.S. Department of Commerce. (2016). Cybersecurity Games: Building Tomorrow’s Workforce [PDF]. Retrieved from https://www.nist.gov/file/362871
NICERC Curricula. (2017). Retrieved from https://nicerc.org/curricula/
Oesch, T. (2017, May 15). Serious Games for Serious Topics: Training Cybersecurity Professionals Using AI-Powered Games. Retrieved from https://www.trainingindustry.com/it-training/articles/serious-games-for-serious-topics-training-cybersecurity-professionals-using-ai-powered-games.aspx
Office of Personal Management. (2016). Compensation Flexibilities to Recruit and Retain Cybersecurity Professionals. Retrieved from https://www.opm.gov/policy-data-oversight/pay-leave/reference-materials/handbooks/compensation-flexibilities-to-recruit-and-retain-cybersecurity-professionals.pdf
Park, M. (2017, May 8). Chance for women and minorities to enter the trillion dollar cybersecurity field Jobs gap opens opportunity for a more diverse workforce. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/
Parton, B. (2017, March 23). AF Series #1: Moving Apprenticeship Forward. Retrieved from https://www.newamerica.org
Paulsen, C., McDuffie, E., Newhouse, W., and Toth, P. (2012, June 26). NICE: Creating a Cybersecurity Workforce and Aware Public. Retrieved from http://ieeexplore.ieee.org/abstract/document/6226542/
Petrella, E. (2017, April 26). Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/regional-alliances-and-multistakeholder-partnerships-stimulate-ramps
Petrella, E. (2017, April 19). NICE Interagency Coordinating Council (ICC). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/interagency-coordinating-council
Pomerleau, M. (2016, February 4). Report outlines cyber activity from top U.S. adversaries. Retrieved from https://defensesystems.com/articles/2016/02/04/crowdstrike-cyber-report-nation-states.aspx
Pound, G. (2017, June 22). STEM verity welcomes important guests. The Union-Recorder. Retrieved from http://www.unionrecorder.com/news/stemversity-welcomes-important-guests/article_fcd96092-56b5-11e7-85cd-831ef80e4901.html
Prebil, M. (2017, June 16). Fresh Ideas for Growing Apprenticeship. Retrieved from https://www.newamerica.org
Prebil, M. (2017). Teach Cybersecurity with Apprenticeship Instead: Governments, private industry, and tech culture can all benefit from a cyber workforce built on quality apprenticeships. New America. Retrieved from https://www.newamerica.org/education-policy/edcentral/teach-cyber-apprenticeship-instead/
Presidential Executive Order Expanding Apprenticeships in America. (2017, June 15). Retrieved from https://www.whitehouse.gov/the-press-office/2017/06/15/presidential-executive-order-expanding-apprenticeships-america
Professional Development. (2016). Retrieved from https://nicerc.org/pd/
Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making. (2013). Retrieved from https://www.nap.edu/read/18446/chapter/5
Reauthorization of Carl D. Perkins Vocational and Technical Education Act. (2007, March 16). Retrieved from https://www2.ed.gov/policy/sectech/leg/perkins/index.html
Recruiting and Retaining Cybersecurity Ninjas. (2016, October 19). Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas
Reed, D., Yung-Hsu Liu, A., Kleinman, R., Mastri, A., Reed, D., Sattar, S., Zeigler, J. (2012, July 25). An Effectiveness Assessment and Cost-Benefit Analysis of Registered Apprenticeship in 10 States. Retrieved from https://wdr.doleta.gov/research/fulltext_documents/etaop_2012_10.pdf
Reeder, F., Timlin, K., Center for Strategic and International Studies (CSIS) Strategic Technologies Program. (2016). Recruiting and Retaining Cybersecurity Ninjas. Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas
Reinhold, M.D. (2016). Memo. [OPM; CHCO Council]. Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act
Requirements of the Federal Cybersecurity Workforce Assessment Act. (2016, August 01). Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act
Robbins, G. (2017, April 17). Tons of $80,000 entry-level jobs going ignored. The San Diego Union Tribune. Retrieved from http://www.sandiegouniontribune.com/news/cyber-life/sd-me-connected-highered-20170417-story.html
Robinson, H. (2017, June 19). Teens join the cyber profession. Retrieved from http://www.csbj.com/2017/06/16/teens-join-cyber-profession/
Saporito, L., Blute, T., National Governors Association (2014). Federal Cybersecurity Programs: A Resource Guide. Retrieved from https://www.nga.org
Scholarships for Women Studying Information Security. (n.d.). Retrieved from http://cra.org/cra-w/scholarships-and-awards/scholarships/swsis/
Scorsone, G. (2017, July 3). Four Things You Must Do to Retain Top Tech Talent. Information Week. Retrieved from http://www.informationweek.com/strategic-cio/team-building-and-staffing/four-things-you-must-do-to-retain-top-tech-talent/a/d-id/1329241
Securing Our Future: Closing the Cybersecurity Talent Gap October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness [PDF]. (2016). Sterling, VA: Raytheon Intelligence, Information and Services. Retrieved from http://www.raytheoncyber.com/rtnwcm/groups/corporate/documents/content/rtn_335212.pdf
Senate - Homeland Security and Governmental Affairs. (2015). S.2007: Federal Cybersecurity Workforce. Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text
Shark, A., Metzanbaum, S., Barquin, R., Wennergren, D. (2015, August). Increasing the Effectiveness of the Federal Role in Cybersecurity Education [Draft PDF]. National Academy of Public Administration. Retrieved from https://www.napawash.org/uploads/Academy_Studies/Cyber-CAE-Report-FINAL…
Shinkman, P. (2016, September 29). America Is Losing the Cyber War. US News. Retrieved from https://www.usnews.com/news/articles/2016-09-29/cyber-wars-how-the-us-stacks-up-against-its-digital-adversaries
Snell, E. (2017, May 03). Addressing the Cybersecurity Skills Gap with Improved Training. Retrieved from https://healthitsecurity.com/news/addressing-the-cybersecurity-skills-gap-with-improved-training
State of Cybersecurity Implications for 2016 An ISACA and RSA Conference Survey [PDF]. (2016). RSA Conference | Where the world talks security and ISACA. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf
Steinberg, S., Schwartz, B. (2014, July 14). The Bottom Line: Apprenticeships Are Good for Business. Center for American Progress. Retrieved from https://www.americanprogress.org/issues/economy/news/2014/07/14/93768/the-bottom-line-apprenticeships-are-good-for-business/
Strategic Plan. (2017, May 05). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/strategic-plan
Stratford, M. (2017, August 02). Congress passes $3B expansion of GI Bill education benefits. Retrieved from http://www.politico.com/story/2017/08/02/veterans-defense-gi-bill-241266
The Comprehensive National Cybersecurity Initiative [PDF]. (n.d.). Executive Office of the President of the United States. Retrieved from http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-034.pdf
The National Strategy to Secure Cyberspace [PDF]. (2003, February). US Cert. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
The Role of Minorities and Women in Cybersecurity. (2016, April 12). Retrieved from http://www.nationalcybersecurityinstitute.org
The 2015 (ISC)2 Global Information Workforce Study [PDF]. (2015). (ISC)². Retrieved from https://www.boozallen.com/content/dam/boozallen/documents/Viewpoints/2015/04/frostsullivan-ISC2-global-information-security-workforce-2015.pdf
University of Maryland Center for Advanced Study of Language. (2016, August). Assessing aptitude for cyber operations Identifying potential candidates for the U.S. Air Force. Retrieved from https://www.casl.umd.edu/wp-content/uploads/2017/04/DO0080_FactSheet_082016.pdf
University System of Maryland. (2011). Report of the Cyber Security Task Force [PDF]. Retrieved from https://www.usmd.edu
University of Texas at San Antonio’s (UTSA) Center for Infrastructure Assurance and Security (CIAS). (2017, August 2). Response to the NIST RFI Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: Workforce Development [PDF]. Retrieved from https://www.nist.gov/sites/default/files/documents/2017/08/02/university_of_texas_at_san_antonio.pdf
Urias, V., Leeuwen, B., Stout, W., & Lin, H. (2017, June 8). Dynamic cybersecurity training environments for an evolving cyber workforce. Retrieved from http://ieeexplore.ieee.org/document/7943509/
U.S. Department of Defense . (n.d.). Troops to Teachers . Retrieved from http://www.dodea.edu/Offices/HR/employment/troopsToTeachers.cfm
U.S Department of Homeland Security . (2016, September 20). Cybersecurity Education & Career Development. Retrieved from https://www.dhs.gov/topic/cybersecurity-education-career-development
U.S. Department of Homeland Security . (2015, November 19). Academic Engagement Results. Retrieved from https://www.dhs.gov/academic-engagement-results
U.S. Department of Homeland Security. (2015, November 12). Academic Engagement Overview. Retrieved from https://www.dhs.gov/academic-engagement-overview
U.S. Department of Homeland Security . (n.d.). Homeland Security Careers. Retrieved from https://www.dhs.gov/homeland-security-careers/hiring-event
U.S. Department of Homeland Security . (n.d.). Homeland Security Careers for Students. Retrieved from https://www.dhs.gov/homeland-security-careers/students
U.S. Department of Homeland Security . (n.d.). Student Opportunities at the Department of Homeland Security [PDF]. Retrieved from https://www.dhs.gov/homeland-security-careers/students
U.S. Department of Labor. (2017, May 11). Shareables: Get the Facts On Apprenticeship. Retrieved from https://www.dol.gov
U.S. Department of Labor Employment and Training Administration ApprenticeshipUSA. (2016). Data and Statistics. Retrieved from https://www.doleta.gov/oa/data_statistics.cfm
U.S. Department of Labor. (n.d.). Apprenticeship. Retrieved from https://www.dol.gov/apprenticeship/index.htm
Virginia Cyber Commission. (2015). Commonwealth of Virginia Cyber Security Commission “Threats and Opportunities”. Retrieved from https://www.virginia.gov/
Waterman, S. (2017, June 12). Recruitment and retention of 'cyber ninjas' doesn't have to be a dark art, report says. Retrieved from https://www.cyberscoop.com/systems-integrators-top-cybersecurity-recruitment-talent-sans-institute-report-workforce/
Watson, E. (2015, March 12). Black Colleges at the Forefront of Cybersecurity Issues. Retrieved from http://www.huffingtonpost.com/elwood-d-watson/black-colleges-at-the-forefront-of-cybersecurity-issues_b_6852334.html
Welcome to the CAE Community. (n.d.). Retrieved from https://www.caecommunity.org/
Whitehouse, S., McCaul, M., Evans, K., Bhalotra, S., Center for Strategic and International Studies (CSIS) Cyber Policy Task Force. (2017). From Awareness to Action a Cybersecurity Agenda for the 45th President.
Why IT Matters to Higher Education: Educause Review home page. (n.d.). Retrieved from http://er.educause.edu/
Williams, B. D. (2017, May 26). Profiles in cyber: Understanding the US's major adversaries in cyberspace. Retrieved from https://www.fifthdomain.com
Women in Cybersecurity. (n.d.). Retrieved from https://www.csc.tntech.edu/wicys/
Women in Security and Privacy (WISP) Advancing Women to Lead the Future of Privacy and Security. (n.d.). Retrieved from http://www.wisporg.com
Women’s Society of Cyberjutsu . (n.d.). Retrieved from http://womenscyberjutsu.org/
Wong, C. (2017). Women in Cybersecurity A PROGRESSIVE MOVEMENT. Retrieved from https://resource.cobalt.io/hubfs/2017%20Women%20in%20Cybersecurity%20A%20Progressive%20Movement.pdf
Workforce Management Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/workforce-management-sub-working-group
Yasaitis, C., LeGrand, M. (2016, July 5). Cybersecurity: A Top Priority for Airline Boards. Russell Reynolds Associates. Retrieved from http://www.russellreynolds.com/newsroom/cybersecurity-a-top-priority-for-airline-boards
Zadelhoff, M. V. (2017, May 4). Cybersecurity Has a Serious Talent Shortage. Here's How to Fix It. Retrieved from https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it
2009 Cyberspace Policy Review. (2015, August 10). Retrieved from https://www.dhs.gov/publication/2009-cyberspace-policy-review
(ISC)² Study: Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate. (2015, April 17). Retrieved from http://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html