Cybersecurity Workforce Measures Present Business Opportunities

29 April 2015 Manufacturing Industry Advisor Blog

As part of the federal government’s efforts to address cybersecurity needs in our age of state-sponsored hacking and other high-profile data breaches, the Department of Homeland Security (DHS) will soon undertake a Congressionally-mandated review of cybersecurity resources. In just two months, the Secretary of DHS will be required to conduct the first assessment of the Department’s cybersecurity workforce and evaluate its readiness and capacity to meet the agency’s cybersecurity mission. The assessment of the DHS workforce necessary to defend and protect against ongoing cyber threats will be an important component of a DHS mission to develop a comprehensive cybersecurity strategy. Part of the assessment requires DHS first to identify cybersecurity workforce vacancies, and by the end of the year to devise a well-conceived strategy to recruit cybersecurity professionals. More granular information on the primary work functions of each workforce position by cybersecurity category and specialty area also will be provided. The development of the comprehensive strategy and resulting federal recruitment efforts present opportunities for cybersecurity vendors and individual professionals to address skills gaps in the current federal workforce.

Workforce Evaluation

The DHS evaluation, due by mid-June, is a requirement of the Cybersecurity Workforce Assessment Act (CWAA), which was one of several federal cybersecurity laws that were enacted in December 2014. The assessment under the CWAA also is required to include information about the composition of the existing cybersecurity workforce in addition to known vacancies, including whether the position is performed by full-time employees, independent contractors, or employees from other federal agencies. To help ensure an accurate and comprehensive analysis applicable over the long term, DHS is required to conduct the analysis annually thereafter for three years.

Comprehensive Cybersecurity Workforce Strategy for the Future

Perhaps more significant, by mid-December 2015, DHS is required to have developed a “comprehensive workforce strategy to enhance the readiness, capacity, training, recruitment, and retention of the cybersecurity workforce of the Department,” a strategy that may be affected by other congressional action on the cyber-security front affecting implementation of government agency security programs and centralizing federal government cybersecurity management within the DHS. In the midst of widely publicized shortages of information security skills, a key component of the strategy will be the identification of any gaps in the current cybersecurity workforce and the plans to fill them, as well as any perceived obstacles in hiring or developing the workforce that DHS deems appropriate. The targeted employment goals are to be modified as necessary to achieve the comprehensive workforce strategy, and DHS will focus special attention on recruiting experienced professionals and members of disadvantaged and underserved communities, as well as qualified veterans and unemployed cybersecurity personnel. Five-year implementation plans and 10-year projections regarding of the DHS workforce also are mandated.

Additional information about the kinds of cybersecurity jobs for which DHS may recruit can be obtained through the National Cybersecurity Workforce Framework, which categorizes, organizes and defines cybersecurity work and reflects the contributions of approximately 20 federal departments and agencies. The Workforce Framework is the product of the National Initiative Cybersecurity Education (NICE), which operates at DHS’s direction and promotes the growth, strength and capability of the cybersecurity workforce. Together, NICE and the Workforce Framework can be valuable resources for cyber vendors and prospective employees seeking to:  (i) navigate the sophisticated challenges in preparing for cyber threats to government and private interests; and (ii) meet the workforce demands for cybersecurity expertise to counter those threats.

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Related Services