50 likes | 60 Views
This workshop focuses on identifying cyber learning objectives for multi-domain battle and training in a blurred conflict environment. It also explores strategies to maintain relevant knowledge, skills, and abilities for cyber professionals in an evolving threat landscape.
E N D
CERTS Workshop 1: Developing Training Resources & Education Curriculum Dr. Edward SobieskChief of Education/Professor of Computer and Cyber Science, Army Cyber Institute Workshop Out brief January 18, 2018
Workshop #1Co- Chair: Kevin Hofstra, Chief Technology Officer, MetovaCyberCENTS • Subgroup 1: How do we identify the cyber learning objectives that address multi-domain battle and train for an environment where conflict is blurred and cyber impacts are difficult to identify/attribute? • Accomplish cyber-focused experiments focused on targeted learning objectives (Cyber support tools, CMF augmentation, POR warfighting systems and Traditional Warfighter) • Incorporate intel-based operations left of Phase 0. • Develop cyber components in campaign planning training to include authorities and timing. • Cyber “Dial of Death” – Require full chain of detection to restoral of cyber capabilities (Vice PACE)
Workshop #1Co-Chair: Mark Baggett, SANS Institute • Subgroup 2: What knowledge, skills, and abilities are needed and helpful in order to ensure minimally prepared commissioned and non-commissioned leaders for the Cyber Force? • Proficiency in System Administration • Proficiency in Network Design and Architecture • Proficiency in Programming and Logic • Proficiency in Governance • Introduction to Offensive Skills and Techniques • Introduction to Defensive Skills and Techniques • The Proper Psychological Attributes
Workshop #1Co-Chair: Dr. Scott Smith, Leader Development and Education Analyst, U.S. Army Cyber School, U.S. Army Cyber COE • Subgroup 3: How does the Army create a training strategy that ensures cyber professionals maintain relevant knowledge, skills, and abilities in a domain that is continually evolving concurrent with evolving threat activities? • How do cyber personnel assess themselves (self, peer, formal, pre-developed measures, etc.)? • How do we resource identified development opportunities (time, money, agreements, etc.)? • How do we ensure that personnel are rewarded for their development (modify existing development maps, assignments, promotion, etc. – i.e., doctors)?
Workshop #1Co-Chair: LTC Benjamin T. Sangster, USA, Commanding Officer, Cyber Training Battalion • Subgroup 4: How does the Army create a training strategy that ensures cyber professionals maintain relevant knowledge, skills, and abilities in a domain that is continually evolving concurrent with evolving threat activities? • Need to be able to rotate instructors from operational to platform quickly. • Bridging the gap between soldiers with no STEM degree or training and highly trained individuals, and give those advanced individuals options for education. • Drawing instruction personnel from academia and the private sector in short bursts (6 months, or during sabbatical).