Preface |
|
iii | |
|
|
vii | |
Summary |
|
ix | |
Acknowledgments |
|
xvii | |
Abbreviations |
|
xix | |
Prologue |
|
1 | (4) |
|
|
3 | (2) |
|
Chapter One Why Has Demand Risen Sharply? |
|
|
5 | (8) |
|
The Federal/Military Cybersecurity Workforce Problem |
|
|
7 | (3) |
|
|
10 | (3) |
|
Chapter Two What Others Have Observed |
|
|
13 | (16) |
|
GAO, Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination |
|
|
14 | (3) |
|
Partnership for Public Service and BAH, "Cyber IN-Security: Strengthening the Federal Cybersecurity Workforce" |
|
|
17 | (2) |
|
CSIS Commission on Cybersecurity for the 44th Presidency, "A Human Capital Crisis in Cybersecurity" |
|
|
19 | (3) |
|
DoD, Cyber Operations Personnel Report |
|
|
22 | (2) |
|
Homeland Security Advisory Council, CyberSkills Task Force Report |
|
|
24 | (2) |
|
Amyas Morse, The UK Cyber Security Strategy: Landscape Review |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Chapter Three Findings from Interviews and Statistics |
|
|
29 | (12) |
|
How Employers Meet their Need for Cybersecurity Professionals |
|
|
30 | (6) |
|
|
31 | (2) |
|
Central Intelligence Agency |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (5) |
|
|
37 | (2) |
|
|
39 | (2) |
|
Chapter Four The Economics of the Cybersecurity Labor Market |
|
|
41 | (14) |
|
A Simplified View of the Labor Market for Cyberprofessionals |
|
|
41 | (3) |
|
The Adjustment of Labor Demand to Shocks |
|
|
44 | (2) |
|
Differences in Human Capital |
|
|
46 | (3) |
|
Factors Related to Government Agency Characteristics |
|
|
49 | (3) |
|
Geographic Considerations |
|
|
52 | (1) |
|
|
53 | (2) |
|
Chapter Five Upper-Tier Cybersecurity Professionals and Policy Options |
|
|
55 | (16) |
|
The Search for the Upper-Tier Cybersecurity Professional |
|
|
55 | (3) |
|
Policy Options for Meeting Cybersecurity Needs |
|
|
58 | (9) |
|
|
59 | (1) |
|
|
60 | (2) |
|
Differentiate Job Categories More Precisely |
|
|
62 | (1) |
|
Address Civil Service Issues |
|
|
63 | (2) |
|
Review Veterans' Preferences |
|
|
65 | (1) |
|
Use Guard and Reserve Units |
|
|
66 | (1) |
|
|
67 | (1) |
|
Reducing the Demand for Cybersecurity Professionals |
|
|
67 | (4) |
|
|
71 | (8) |
|
|
75 | (4) |
References |
|
79 | |