Title of the Whole Briefing

advertisement
Cyber Workforce
Development
Trained and Ready Cyber Teams
Mr. Michael Hudson
J72, Training & Readiness Division Chief
U.S. Cyber Command
27 June 2013
1
Overview
UNCLASSIFIED
• Issues/Challenges
• USCYBERCOM Missions and Operations
• Requirements to Operate in Cyberspace
• Cyberspace Operations
• J7 Vision/Mission
• Technical Workforce Challenges
• Joint Training System
• Joint Mission Essential Tasks
• Workforce Management
• Workforce Framework
• Training Spectrum
• Example of Individual Certification
• Example of Cyber Training Venues
• Summary
• Questions
UNCLASSIFIED
2
UNCLASSIFIED
Issues/Challenges
THE CHALLENGE
• We are currently preparing students for jobs that don’t yet exist, using technologies that haven’t
been invented in order to solve problems we don’t even know are problems yet
• The U.S. Department of Labor estimates that today’s learner will have 10-14 jobs by the age of 38
THE COMPETITION
• China will soon become the #1 English speaking country in the world
• 25% of India's population with the highest IQs is greater than the total population of the U.S.
• The top 10 highest demand jobs in 2010 did not exist in 2004
THE FUTURE WORKFORCE – GENERATION Y
• Multitasking
• Optimistic outlook – self-confident
• High expectations – questioning
• Technical savvy
• Job hoppers – career progression less important than
personal pursuits
• Huge potential for miscommunication, low morale, and poor
productivity in generational workforce
UNCLASSIFIED
3
UNCLASSIFIED
USCYBERCOM Missions and Operations
USCYBERCOM plans, coordinates, integrates,
synchronizes and conducts activities to: direct the operations and defense of specified
Department of Defense information networks and; prepare to, and when directed,
conduct full spectrum military cyberspace operations in order to enable actions in all
domains, ensure US/Allied freedom of action in cyberspace and deny the same to our
adversaries.
Defend the Nation
Cyber National
Mission Force
Operate and Defend
DoD Information
Networks (DODIN)
Cyber Protection
Force
CCMD Support
Cyber Combat
Mission Force
3 Lines of Operations - Running Throughout the Mission Areas
1.DODIN Operations
2.Defensive Cyber Operations (DCO)
3.Offensive Cyber Operations (OCO)
UNCLASSIFIED
4
UNCLASSIFIED
Defensible
Architecture
Trained & Ready Cyber Teams
Operate
&
Defend
Govern
Operational Concept
Authority to Act
in Defense
of the Nation
Global Situational Awareness
UNCLASSIFIED
5
UNCLASSIFIED
(U) What it Takes to do Cyber Operations
Attribute
Attacks
Develop
Crypto
Defensive
Response
Identify
Attacks
Attack
Targets
Harden US
Networks
Assess
Effects
Produce
Intelligence
Identify
Targets
Target
Process
& Store
Data
Develop
Intelligence
Intelligence Analysts
Deploy
Capabilities
Defeat
Encryption
Collect
Data
Linguists
Network
Operators
Capabilities
Developers
Accesses
Cryptanalysts
Access Enablers
Network Analysts
Net Warfare
Planners
Cyberspace Operations:
UNCLASSIFIED
Intelligence Community, Military, Foreign
Partners, Industry
6
UNCLASSIFIED
J7 Vision/Mission
• (U) Develop agile, flexible training to prepare world-class, fully capable cyber forces for the
present and future, through focused common standards, training engagements, and career
training management for individual through collective training and education to support the
Command’s cyberspace operations missions.
– (U) Individual training
• (U) Advise recruiting and assessment qualification standards
• (U) Advise Service School and Branch Qualification Training
• (U) Develop certification for advancing roles and responsibilities
– (U) Information Assurance Workforce Improvement Plan
– (U) Joint Individual Training
– (U) Joint Work Roles and Responsibilities
• (U) Advise and engage continuing education
– (U) Joint Professional Military Education
– (U) Public/Private University System (Defense Universities, Public/Private Institutions)
– (U) Collective Training
• (U) Training and Certification Events (e.g., Cyber Flag)
• (U) Cyber-focused Exercises (e.g., Bulwark Defender)
– (U) Retention
7
UNCLASSIFIED
7
UNCLASSIFIED
Technical Workforce Challenges
Future Workforce Population
Trending Down
Future STEM Graduates
Trending Down
• What are the real drivers influencing the trend lines?
• What are some of the solutions?
• How can we leverage the brain trust looking at these problems?
8
UNCLASSIFIED
8
UNCLASSIFIED
Joint Training System (JTS)*
Phase 1. REQUIREMENTS
• Joint Mission Essential Tasks
• Missions/Orders/Strategy/Policy
• Work Roles/Standards
Phase 2. PLANS
Phase 4. ASSESSMENT
• Joint Training Plan
• Training and Readiness Manual
• Joint Cyberspace Training and Certification Standards
• Joint Training Information Management System
• Defense Readiness Reporting System
• Lesson Learned
Joint Exercise Life Cycle
Plan
Evaluate
Prepare
Execute
Phase 3. EXECUTION
• Combatant Command Tier 1 Exercises
• Cyber Flag, Cyber Guard, Cyber Knight
• Cyber Wargame
*CJCSM 3500.03, Joint Training Manual
“It is important…to assign responsibility for the JTS across all disciplines within your staff. The processes of JMETL
development, of determining training objectives, and of developing the Joint Training Plan all require the skill and
corporate knowledge of many people.’”
Joint Training System Primer
UNCLASSIFIED
9
UNCLASSIFIED
Joint Mission Essential Tasks

JMET Development
–
A JMET describes the essential tasks for a joint
commander and includes associated conditions and
measurable standards
–
JMETs are identified by reviewing plans and OPORDS
for executing a mission
–
JMETs are identified using the UJTL as a common
language
An essential task is defined as one
where the mission has a high
probability of failure if it is not
accomplished successfully.
UNCLASSIFIED
10
UNCLASSIFIED
UNCLASSIFIED
JMETL Development Process
1. Conduct Mission Analysis to Determine
Specified & Implied Tasks
2. Select Mission Tasks from Universal
Joint Task List (UJTL)
3. Determine Essential Tasks from Mission
Tasks
4. Identify Responsible Organizations
5. Describe Conditions
6. Establish Standards
7. Identify Supporting, Command and
Linked Tasks
8. Commander Approves JMETL
The methodology for constructing the JMETL, when properly conducted, ensures
that joint training is requirements-based, trains the force the way they intend to
operate and is focused on essential tasks that accomplish theater missions.
UNCLASSIFIED
UNCLASSIFIED
11
UNCLASSIFIED
Methodology
JMET
• Identify Mission Conditions
• Define Objectives (Capacity and Capability)
• Identify Intermediate Objectives
• Identify Output and Standards
• Identify Dependencies and Constraints
TTP
• Identify Resource Conditions
• Identify Processes and Metrics
• Identify Process Dependencies
• Identify cross-linkages
KSA
• Map workrole to process
• Verify appropriate KSAs
• Identify Individual Productivity Standards
and Metrics
PROCESS MAP
UNCLASSIFIED
12
UNCLASSIFIED
Workforce Management – Demand
Analysis
(U) Workforce Management
•
•
•
•
(U) Needs
(U) Capability
(U) Capacity
(U) Integration?
(U) Projected Need
• (U) Strategy/Mission Analysis
• (U) Evolving Workforce Mission Requirements
• (U) Current/Projected Force Readiness
(U) Workforce KSAs to Meet Projected Need
(U) Demand Analysis
• (U) New/modified KSAs required; delete nonessential work roles/functions
• (U) Consolidation of work roles/functions
• (U) Projected Need
• (U) Workforce KSAs to Meet
Projected Need
• (U) Staffing Patterns
• (U) Training Pipeline Requirements
(U) Staffing Patterns
• (U) Number of personnel required to perform
evolving mission
• (U) Organization functional review
(U) Training Pipeline Requirements
The right number of people with the right
skills, experience, and competencies in
the right places at the right time.
UNCLASSIFIED
• (U) Required training
• (U) Training throughput/billets
• (U) Training resources
13
UNCLASSIFIED
Workforce Framework Development
CND
Operate
&
Maintain
Systems
Security Analyst
Network
Infrastructure
Specialist
Knowledge /
Content
Manager
Server
Administrator
Technical
Support
Specialist
Defend
CND Analyst
CND
Infrastructure
Support
Specialist
CND Incident
Responder
Provision:
Design &
Build
Systems
Architect
CND Manager
Systems
Requirements
Planner
Data
Administrator
Cyber security
Analyst/Informa
tion Security
Professional
of several specialty
areas.
Software
Engineer
IA Compliance
Agent
CND Forensics
Analyst
The Framework organizes
cybersecurity into seven highlevel categories, each comprised
Systems
Developer
CND Auditor
Network
Operations
Manager
UNCLASSIFIED
Framework Categories
14
UNCLASSIFIED
NICE Framework
• Securely Provision
o Specialty areas concerned with conceptualizing, designing, and building secure IT systems.
• Operate and Maintain
o Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure
effective and efficient IT system performance and security.
• Protect and Defend
o Specialty area responsible for the identification, analysis and mitigation of threats to IT systems and
networks.
• Investigate
o Specialty areas responsible for the investigation of cyber events or crimes which occur within IT Systems and
networks.
• Operate and Collect
o Specialty areas responsible for the highly specialized and largely classified collection of cybersecurity
information that may be used to develop intelligence.
• Analyze
o Specialty area responsible for highly specialized and largely classified review and evaluation of incoming
cybersecurity information.
• Support
o Specialty areas that provide critical support so that others may effectively conduct their cybersecurity work.
UNCLASSIFIED
15
UNCLASSIFIED
Training Spectrum
IAWIP
Service Career
Training
Joint Individual
Training
Collective Training
Gap/Refresher Training
Professional and Continuing Education
Gap/Refresher Training
DoDIN
Ops
DCO
OCO
Service School and Qualification Training
Sustain
Cyber
Warrior
Career
Create
Cyber
Warrior
Individual Training
Joint Cyberspace Training
and Certification Standards
JMETs
Staff/Unit Certification
Cyber Flag Training
Certification Levels
Retention and Career
Feedback Process
Collective
Training
Cyberspace Exercise
Assessment and Recruiting
UNCLASSIFIED
16
UNCLASSIFIED
Example of Individual Certification
1 Evaluation
2 Practical Exam
Objective
•
•
•
Standardized, High-Stakes,
Scored
Knowledge Based
Remediation Requirements
Identified
•
•
•
Subjective/Objective
3 Review Board
Subjective
•
•
•
•
•
Task Based
Scenario Based
Tailorable
Virtual / Live
Persistent Training
Environment
Paper-Based and Interview / Panel
Leadership
Documentation and Compliance
Oversight
Additional Information
•
UNCLASSIFIED
Annual re-certification requirement to ensure / verify perishable skills
17
UNCLASSIFIED
Developing Cyber Warriors
OPERATING AS A TEAM
Build on individual joint training
Rehearsal of concept
Role familiarization
Integrate and synchronize shared capability
responsibilities
UNCLASSIFIED
18
UNCLASSIFIED
Example Cyber Training Venues
Service Hosted Training Venues for Cyberspace Operations
USA
USN
• Signal Center of Excellence, Fort
Gordon, GA
• Information Assurance Training
Center – FT Gordon, GA
• Computer Network Defense
Course – FT McCoy, WI
• Basic Computer Network
Operations Planners Course
(BCNOPC) – FT Belvoir, VA
• Center for Information Dominance,
Corry Station, FL
• Joint Network Attack Course
(JNAC)
• Naval Postgraduate School,
Monterey, CA
USAF
•Air Force Institute of Technology,
Wright-Patterson AFB, Dayton, OH
• Center for Cyberspace Research
USMC
• Marine Air Ground Task Force
Training Command, 29 Palms, CA
Other Training Venues for Cyberspace Operations
NSA/ADET College of
Cryptology
•Center for Computer Network
Operations, Cyber Security and
Information Assurance
UNCLASSIFIED
Department of Defense
•DoD Cyber Crime Training
Academy, Linthicum, MD
• Technology Track
• Responders Track
• Network Investigations Track
• Intrusions Track
• Forensics Track
•The Information Assurance Training
Center, Fort Detrick, MD
•The Information Assurance Training
Center, Lewis-McCord, WA
•The Information Security Center,
Fort Bragg, NC
Universities/Colleges
• University of Maryland University
College
• Various cyber certifications and
undergraduate/graduate level
degrees
• University of Dayton
• Post Graduate program in Cyber
Security Management
•University of Maryland Baltimore
County
• Various cyber certifications and
undergraduate/graduate level
degrees
Private Sector
• NG Cyber Warrior Course
• Security Awareness and
Certification
• Accreditation Courses
19
UNCLASSIFIED
Summary
The integrated USCYBERCOM strategy for training includes:
• Individual training through the development of a cradle-to-grave training and career
progression model that ensures individuals are professionally developed to assume
greater roles and responsibilities to meet the demands of the command’s three Lines
of Operation
• Collective training through the development of crew, staff, and unit level training
that encompasses tactical, operational, and strategic levels of cyberspace warfare
while supporting and ensuring relevant collective training events are realistic,
instrumented, and agile
• Development of a Common Training Standards Program that develop requirements,
provide guidance for individual and collective training, and track and assess the
nation’s cyberspace force readiness
20
UNCLASSIFIED
20
UNCLASSIFIED
Questions?
UNCLASSIFIED
21
UNCLASSIFIED
Back-ups
UNCLASSIFIED
22
Unclassified
Training / Workforce Development
Ensuring
Interoperability
• Establish interoperable cyber training standards (common, core Knowledge, Skills, & Abilities)
• Validate training requirements (1)
• Align, synchronize, improve, and evaluate the integration and interoperability of cyber forces through exercises
and collective training (1)
• Advocate for combatant command training requirements to include DOTMLPF, materiel, and enabling capabilities
(2)
• Examine DoD exercises, wargames, and experiments related to cyber operations to determine potential
efficiencies, establish guidelines, and incorporate lessons learned. (2)
Training &
Instruction of
Assigned Forces
• Integrate command training requirements into DoD training and education programs (1)
• Certify, monitor, and assess DoD cyber training programs (1)
• Standardize core cyber training across DoD (1)
• Design and conduct strategic & national level exercises, wargames, and table top exercises (1)
• Enable CCDR to focus training on capability shortfalls to address current and future threats (2)
• Manage academic and community outreach programs to private and public institutions (3)
Workforce
Readiness (incl.
non-assigned)
• Monitor the health of the DoD cyber force (2)
• Identify, coordinate, maintain cyber-related JMETL/UJTL to ensure readiness (incl non-asg’d forces) (3)
• Develop training and evaluation activities to determine readiness (1)
• Monitor DRRS and provide assistance in mitigating readiness issues (2)
Develop
Doctrine
•
•
•
•
•
Develop and maintain joint cyber doctrine and concepts (3)
Ensure training and training strategies are consistent with current and emerging cyber doctrine (1)
Act as lead agent for joint cyber publications as designated by Joint Staff J7 (1)
Ensure Service cyber doctrine is consistent with joint doctrine (3)
Promotes a common definition of “cyber force” and descriptions of cyber tasks (2)
Monitor
Promotions,
PME, etc
•
•
•
•
Inform the Service process of promotions (3)
Identify cyber career milestones recommended for promotion (2)
Identify, advocate, and develop cyber PME required for promotion (2)
Advocate the investment of cyber human capital (1)
Unclassified
23
Download