recommended reading

Qualifying Cyber Command Staff Is Harder Than You Think

Jeff Wasserman/Shutterstock.com

The Coast Guard Cyber Command aims to qualify a couple of service members for what Pentagon officials have said will be a 2,000-member force within the next two years.  

It will take all the military services a lot of time and money to get their members qualified for the force. For the Coast Guard, the task is even harder because it has no dedicated cyber school and splits its activities between defense and homeland security.  

The two-person figure, provided by the Coast Guard's cyber chief, partly reflects the difficulty of instructing computer whizzes from various educational backgrounds to reach the same proficiency level. It takes resources.

"This is 26, 27 weeks long or longer – months’ worth --of training before they are qualified and ready to go," Rear Adm. Bob Day, commander of the Coast Guard CYBERCOM, told Nextgov. "We’re investing millions" of dollars, he added. 

CYBERCOM training requires personnel not only to complete differing service cyber courses, but also classes at CYBERCOM headquarters in Ft. Meade. Cyber warriors arrive at Ft. Meade speaking to each other in essentially different languages, using various terms for similar cyber concepts. "Even though you call this 'XYZ,' we call it 'ABC,' are they the same course?" is the question, Day said.

Defense Department officials have said they want a fully-staffed CYBERCOM by 2016, comprising about 100 cyber mission force teams. Cyber Command oversees all military cyberattack operations and defensive maneuvers.  

What "we’re looking for is opportunities for a -- or two -- Coast Guard personnel to participate on the cyber mission team," Day said.

His 22-person cyber workforce is smaller than most CYBERCOM service components, because the Coast Guard, a Homeland Security Department agency, splits its attention between domestic security and military operations. Day expects his cyber mission force members to align with Fleet Cyber Command and perhaps a partner combatant command, such as SOUTHCOM or NORTHCOM. 

His members first must obtain the cyber credentials troops obtain at service schools, then generally go to Ft. Meade. "And then once they have gone through those qualifications, they will actually get tested on it to see whether they are qualified to be on a cyber mission team," Day said. "You have to put so much energy in them to get them trained up to the standard. Otherwise they can’t be on the team." 

(Image via Jeff Wasserman/Shutterstock.com)

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.