This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Enhancing the Cybersecurity Workforce
Jan.-Feb. 2011 (vol. 13 no. 1)
pp. 12-15
Michael J. Assante, National Board of Information Security Examiners
David H. Tobey, National Board of Information Security Examiners
Current cyberdefense tactics, security architectures, and tools can help address many common threats, but they're insufficient when addressing adaptive, embedded, and interconnected threats. The best defense requires a well-developed workforce. The new Ground Truth Expertise Development model can help create the next-generation cyberworkforce.

1. V. Choudhury, A. Lopes, and D. Arthur, "Issues and Opinions—IT Careers Camp: An Early Intervention Strategy to Increase IS Enrollments," Information Systems Research, vol. 21, no. 1, pp. 1–14.
2. K.A. Ericsson et al., The Cambridge Handbook of Expertise and Expert Performance, Cambridge Univ. Press, 2006.
3. J. Rothstein, "College Performance Predictions and the SAT," J. Econometrics, vol. 121, nos. 1–2, 2004, pp. 297–317.
4. G. Colvin, Talent is Overrated: What Really Separates World-Class Performers from Everybody Else, Portfolio, 2008.
5. K.A. Ericsson, "Deliberate Practice and Acquisition of Expert Performance: A General Overview," Academic Emergency Medicine, vol. 15, no. 11, 2008, pp. 988–994.
6. D.H. Tobey, "Storying Crisis: What Neuroscience Can Teach us about Group Decision Making," Southwest Academy of Management, 2008; http://nmsu.academia.edu/DavidTobey/Papers/ 203667Tobey_2008_Storying_Crisis.
7. D.H. Tobey and P.G. Benson, "Aligning Performance: The End of Personnel and the Beginning of Guided Skilled Performance," Management Revue, vol. 20, no. 1, 2009, pp. 70–89.
8. D.H. Tobey, "COTS-Based Systems: Automating Best Practices," USC Center for Software Engineering Annual Research Review, 2001; http://sunset.usc.edu/Activities/feb6-9-01/ PresentationsDavis%20H.%20Tobey-COTS-Based%20Systems.ppt .
9. R.O. Briggs et al., "ThinkLets: Achieving Predictable, Repeatable Patterns of Group Interaction with Group Support Systems (GSS)," Proc. 34th Ann. Hawaii Int'l Conf. System Sciences, 2001, pp. 1057–1065; www.hicss.hawaii.edu/HICSS_34/PDFsCLUSR04.pdf .
10. D. Trafimow and S. Rice, "Potential Performance Theory (PPT): Describing a Methodology for Analyzing Task Performance," Behavior Research Methods, vol. 41, no. 2, 2009, pp. 359–371.
11. "Remarks by the President on Securing our Nation's Cyber Infrastructure," The White House, 29 May 2009; www.whitehouse.gov/the-press-officeremarks-president-securing-our-nations-cyber-infrastructure .

Index Terms:
Cyberdefense, cyberworkforce, security, information technology, security and privacy
Citation:
Michael J. Assante, David H. Tobey, "Enhancing the Cybersecurity Workforce," IT Professional, vol. 13, no. 1, pp. 12-15, Jan.-Feb. 2011, doi:10.1109/MITP.2011.6
Usage of this product signifies your acceptance of the Terms of Use.