Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Reference List

The following Reference List contains cybersecurity articles, strategies, reports, programs, and efforts that were compiled and consulted as part of an environmental scan to inform the assessment of current cybersecurity education and training efforts.

Please note: These resources were referenced in 2017. Some of the original links may no longer be working and/or accurate.


Download PDF

References

A Cybersecurity Agenda for the 45th President. (2017, January 5). Retrieved from https://www.csis.org/news/cybersecurity-agenda-45th-president

An Examination of the Cybersecurity Labor Market. (n.d.). Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf

Applications Now Available for City Colleges of Chicago’s New Cyber Security “Boot Camp”. (2017, March 18). Retrieved from http://www.ccc.edu/news/Pages/Applications-Now-Available-for-City-Colleges-of-Chicagos-New-Cyber-Security-Boot-Camp-.aspx

ApprenticeshipUSA Investments. (2017, June 22). Retrieved from https://www.dol.gov/featured/apprenticeship/grants

Assante, M., Tobey, D. (2011, February 4). Enhancing the Cybersecurity Workforce. Retrieved from http://ieeexplore.ieee.org/document/5708280/

Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text

ATE Centers. (n.d.). Retrieved from http://www.atecenters.org/

ATE Centers and National Science Foundation. (n.d.). ATE Centers Impact Report. Retrieved from http://www.atecenters.org/wp-content/uploads/PDF/ATEIMPACT_2016-17.pdf

ATE Centers and National Science Foundation. (n.d.). ATE Programs and Overview. Retrieved from http://www.atecenters.org/wp-content/uploads/2016/07/ATE_Overview_2016.pdf

AUSTRALIA’S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity [PDF]. (n.d.). Retrieved from https://cybersecuritystrategy.pmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf

Baltimore Cyber Range and Cyberbit Open New Cybersecurity Training and Simulation Center. (2017, August 3). Retrieved from https://www.cyberbit.com

Bessen, J. (2014, August 25). Employers Aren’t Just Whining – the “Skills Gap” is Real. Harvard Business Review. Retrieved from https://hbr.org/2014/08/employers-arent-just-whining-the-skills-gap-is-real

Best in Class Strategies for Entry-Level Employee Retention Prepared for 100K [PDF]. (2016, October). FSG Reimagining Social Change. Retrieved from https://www.100kopportunities.org/2016/10/14/best-in-class-strategies-for-entry-level-employee-retention/

Best Places to Work for Cyber Ninjas. (2017, May). Retrieved from https://www.sans.org/best-places-to-work-for-cyber-ninjas?ref=195285

Bojanova, I., Vaulx, F., Zettsu, K., Simmon, E., Sowe, S. (2016, January 21). Cyber-Physical-Human Systems Putting People in the Loop. IT Professional. Retrieved from http://ieeexplore.ieee.org/document/7389271/

Burning Glass Technologies. (2015). Job Market Intelligence: Cybersecurity Jobs, 2015 [PDF].   Retrieved from https://ahed.assembly.ca.gov/sites/ahed.assembly.ca.gov/files/hearings/Cybersecurity_Jobs_Report_2015.pdf

Canadian Apprenticeship Forum Forum Canadien Sur I’Apprentissage. (2009, June). It Pays to Hire an Apprentice: Calculating the Return on Training Investment for Skilled Trades Employers in Canada A Study of 16 Trades Phase II Final Report. Retrieved from https://www.nsapprenticeship.ca/sites/default/files/files/CAF-pays.pdf 

Carlini, J. (2017, August 6). Geneva Convention in Cyberwarfare? Don't Count on It. Retrieved from https://intpolicydigest.org/2017/08/06/geneva-convention-cyberwarfare-don-t-count/

Carlini, J. (2017, August 06). Preparing for Nanokrieg: Electronic Wars Being Won and Lost in Microseconds. Retrieved from https://www.jstor.org/stable/26497116

Carlini, J. (2016, April 30). Nanokrieg: The Next Trillion Dollar War | @CloudExpo #Cloud #Security. Retrieved from https://icloud.pe/blog/nanokrieg-the-next-trillion-dollar-war-cloudexpo-cloud-security/

Carsen, D. (2017, July 31). High School Students Track Real Cybercriminals at UAB. Retrieved from  https://news.wbhm.org/feature/2017/high-school-students-track-real-cybercriminals-uab/

Center for Long-Term Cybersecurity, UC Berkeley. (2016). Cybersecurity Policy Ideas for a New Presidency. Retrieved from https://cltc.berkeley.edu/2016/11/18/livestream-new-report-and-panel-on-cybersecurity-policy-ideas-for-a-new-presidency/

Charney, D. (2017, February 3). 6 Talent Trends to Watch in 2017. Material Handling and Logistics (MH&L). Retrieved from http://mhlnews.com/salary-survey/6-talent-trends-watch-2017

Clabaugh, J. (2017, June 22). The right stuff: DC area companies ready to hire, struggle to fill IT jobs. WTOP. Retrieved from http://wtop.com/business-finance/2017/06/the-right-stuff-dc-area-companies-struggle-to-fill-it-jobs-more-to-open/

Coastline Community College. (2016). California Cybersecurity Apprenticeship Project (CCAP). Retrieved from https://drive.google.com/file/d/0B1wjRZl99PuZektWS3k3SEVKVms/view 

Collegiate Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/collegiate-sub-working-group

Commission on Cybersecurity for the 44th Presidency. (2015, September 28). Retrieved from https://www.csis.org/programs/technology-policy-program/cybersecurity/other-projects-cybersecurity/commission

Communications Security, Reliability and Interoperability Council. (2017). Final Report- Cybersecurity Workforce Development Best Practices Recommendations. Retrieved from https://www.fcc.gov/files/csric5-wg7-finalreport031517pdf 

Competitions Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/competitions-sub-working-group

CompTIA. (n.d.). Retrieved from https://www.comptia.org

Concanon, K., Williams, R., Feehan, D., Uvin, J., Yudin, M., Foster, D., … Monje, C. (2016). Federal Partnership regarding career pathways [PDF letter]. Retrieved from https://careerpathways.workforcegps.org/~/media/WorkforceGPS/careerpathways/Files/Career%20Pathways%20Joint%20Letter%202016.pdf 

Conklin, W., Cline, R., & Roosa, T. (2014, March 10). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. Retrieved from http://ieeexplore.ieee.org/document/6758852/

Control-Alt-Hack(R). (n.d.). Retrieved from http://www.controlalthack.com/

Costanzo, J. (2017). Hampton Roads Cybersecurity Education, Workforce, and Economic Development Alliance (HRCyber) Mid-Project Report “Bridging the cybersecurity talent gap in Hampton Roads” [PDF]. Retrieved from http://securitybehavior.com/hrcyber/doc/HRCyber%20Mid-Project%20Report.pdf

Consortium Enabling Cybersecurity Opportunities and Research. (n.d.). K-20 Cybersecurity - CECOR Project . Retrieved from http://cset.nsu.edu/programs/k20cybersecurity

Cyberbit Protecting a New Dimension. (2017). Cyberbit Range The First Hyper-Realistic Simulation Platform for Cyber Security Experts [PDF]. Retrieved from https://www.infosecurityeurope.com/__novadocuments/362748?v=636315473978100000

Cyberbit Protecting a New Dimension. (n.d.). Retrieved from https://www.cyberbit.com/

CyberCorps ®: Scholarship for Service. (n.d.). Retrieved from https://www.sfs.opm.gov/

Cybersecurity Enhancement Act of 2014, Pub. L. No, 113-274, 128 Stat. 2971. (2014). Retrieved from https://www.congress.gov/bill/113th-congress/senate-bill/1353/text

CYBERSECURITY WORKFORCE DEVELOPMENT TOOLKIT How to Build a Strong Cybersecurity Workforce [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://niccs.us-cert.gov/workforce-development/cybersecurity-workforce-development-toolkit

Cyber Security Capital We help cyber security professionals succeed. (n.d.). Retrieved from http://cybersecuritycapital.com

Cyberseek. (n.d.). Retrieved from http://cyberseek.org/

Cyber Competitions. (2017, May 19). Retrieved from https://niccs.us-cert.gov

Cyber Discovery | NICERC. (2016). Retrieved from https://nicerc.org/events/cyber-discovery/

Cyber Innovation Center. (2016). Retrieved from https://cyberinnovationcenter.org/

Cyber IN-security Strengthening the Federal Cybersecurity Workforce [PDF]. (2009, July). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org

Cyber IN-security II Closing the Federal Talent Gap [PDF]. (2015, April). Partnership for Public Service and Booz | Allen | Hamilton. Retrieved from https://ourpublicservice.org

Cyber Space Policy Review Assuring a Trusted and Resilient Information and Communications Infrastructure [PDF]. (n.d.). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov

Dana, J. (2017, April 8). The Utter Uselessness of Job Interviews. The New York Times. Retrieved from https://www.nytimes.com/2017/04/08/opinion/sunday/the-utter-uselessness-of-job-interviews.html

Department of Homeland Security. (2017). National Cyber Security Awareness Month October 2017 [PDF]. Retrieved from https://www.dhs.gov/sites/default/files/publications/NCSAM%202017%20Themes%20One%20Pager-%20508%20compliant.pdf

Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016). Memorandum for Heads of Executive Departments and Agencies. Retrieved from http://www.ncsl.org/documents/statefed/Federal_Cybersecurity_WorkforceStrategy.pdf

Donovan, S., Cobert, B., Daniel, M., Scott, T. (2016, July 12). Strengthening the Federal Cybersecurity Workforce [Blog]. The White House President Barack Obama. Retrieved from https://obamawhitehouse.archives.gov/blog/2016/07/12/strengthening-federal-cybersecurity-workforce 

Economics and Statistics Administration U.S. Department of Commerce. (2016, November 16). The Benefits and Costs of Apprenticeships: A Business Perspective. This resource was originally sourced from the Economics and Statistics Administration. 

EducationHQ News Team. (2017, July 26). Cyber Teacher Professional Learning Series Comes To Australia. Retrieved from https://au.educationhq.com/news/40906/cyber-teacher-professional-learning-series-comes-to-australia/?utm_medium=email&utm_campaign=EducationWeek Australia - Weekend test&utm_content=EducationWeek Australia - Weekend test%2BCID_ef0e00fb43ab4c60c283d7f99a5dba28&utm_source=EducationHQ Campaigns&utm_term=Cyber Teacher Professional Learning Series Comes To Australia

Eichensehr, M. (2017, August 3). Baltimore Cyber Range training facility opens at Power Plant Live. Retrieved from https://www.bizjournals.com/baltimore/news/2017/08/03/baltimore-cyber-range-training-facility-opens-at.html

Elbit Systems of America. (n.d.). Retrieved from http://www.elbitsystems-us.com

Electronic Technology Associates. (2017). Capabilities Statement.  

Elsey, B., Lanier, L., Jessie, S. (2015). Career Pathways Toolkit: A Guide for System Development [PDF]. Retrieved from https://wdr.doleta.gov/directives/attach/TEN/TEN_17-15_Attachment_Acc.pdf

Executive Women's Forum. (n.d.). Retrieved from http://www.ewf-usa.com/

FACT SHEET: Cybersecurity National Action Plan. (2016, February 9). Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan

Federal Communications Commission. (2016, January 29). Task Force on Optimal PSAP Architecture (TFOPA) An FCC Federal Advisory Committee Final Adopted Report. Retrieved from https://apps.fcc.gov/edocs_public/attachmatch/DA-16-179A2.pdf

Federal Cybersecurity Workforce Assessment Act, S.2007, 114th Congress. (2015). Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/actions

FISSEA. (n.d.). FISSEA: Federal Information Systems Security Educators’ Association. Retrieved from http://csrc.nist.gov/organizations/fissea/home/index.shtml

Foote Partners, LLC Foote Research Group. (2016). Cash premiums earned by 65,082 IT professionals, specifically earmarked to 854 certified and noncertified IT skills, rise in 2016; IT security certifications post the highest gains over last 3,6, and 12 months among all certifications categories; For noncertified tech skills, Applications Development related skills continue to beat all others, led by not Big Data and Cloud skills [PDF].  Retrieved from http://www.footepartners.com/fp_pdf/FooteNewsrelease_2Q16ITSkillsTrends_09182016.pdf

GenCyber. (n.d.). Retrieved from https://www.gen-cyber.com/

General Motors. (2017, June 28). General Motors: GM Intensifies Push to Train Young People for Jobs of Future. 4-traders. Retrieved from http://www.4-traders.com/GENERAL-MOTORS-CORPORATIO-6873535/news/General-Motors- GM-Intensifies-Push-to-Train-Young-People-for-Jobs-of-Future-24672566/

George Mason University. (2015, September 21). From Our Partners - Nanokrieg Beyond Blitzkrieg: Mindset to Fight the War on Terrorism by James Carlini. Retrieved from https://cip.gmu.edu/2015/09/21/from-our-partners-nanokrieg-beyond-blitzkrieg-mindset-to-fight-the-war-on-terrorism-by-james-carlini/

George Washington University. (2014). Cybersecurity Education Workshop. Retrieved from https://research.gwu.edu

Goldhammer, J., Weber, S., Cooper, B., Center for Long-Term Cybersecurity: UC Berkeley. (2016). CLTC Occasional White Paper Series Cyber Workforce Incubator. Retrieved from https://cltc.berkeley.edu/2017/04/06/cyber-workforce-incubator/

Good, L., & Zanville, H. (2017, August 2). Four Lessons Learned from the National Connecting Credentials Campaign [Web log post]. Retrieved from http://connectingcredentials.org/four-lessons-learned-national-connecting-credentials-campaign/

Goodman, M. (2016, July 28). How to Attract More Diversity in Cybersecurity Hiring [Blog]. RSAConference Where the world talks security. Retrieved from https://www.rsaconference.com/blogs/how-to-attract-more-diversity-in-cybersecurity-hiring

Greater Phoenix Chamber Foundation Strengthening and Expanding the Talent Pipeline: Cyber Security [PDF]. (2016, August 22). Greater Phoenix Chamber Foundation- Cyber Security Workgroup. Retrieved from https://phoenixchamber.com/2016/10/27/cybersecurity-increasing-your-resiliency-building-the-talent-pipeline/

Hacking the Skills Shortage, A study of the international shortage in cybersecurity skills Center for Strategic and International Studies [PDF]. (2016). Santa Clara, CA: INTEL Security.
Retrieved from https://www.mcafee.com/us/resources/reports/rp-hacking-skills-shortage.pdf

Halvorsen, T., U.S. Department of Defense. (2015). A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the “National Center of Academic Excellence in Information Assurance Education Matters”. Washington, DC. Retrieved from https://www.cisse.info/pdf/2015/DoD%20942%20Report%20to%20Congress_FINAL.pdf

Health Care Industry Cybersecurity Task Force. (2017, June 2). Report on Improving Cybersecurity in the Health Care Industry [PDF]. Retrieved from https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf

Helper, S., Noonan, R., Nicholson, J., Landon, D. (2016). The Benefits and Costs of Apprenticeship: A Business Perspective [PDF]. This resource was originally sourced from the Economics and Statistics Administration.

Herrmann, A., Rehm, K., Carlini, J., Schkeeper, P., Loken, L., Swanson, J., … Maltby, J. (2009, October). The CIP Report Center for Infrastructure Protection volume 8 number 4 [PDF].  Retrieved from https://cip.gmu.edu/homepage_slider/the-cip-report-2/

Hernandez, P. (2016, December 1). Commission on Enhancing National Cybersecurity. Retrieved from https://www.nist.gov/cybercommission

Hoffman, L. J. (2010, December 15). Building the Cyber Security Workforce of the 21 Century: Report of a Workshop on Cyber Security Education and Workforce Development. Retrieved from https://cspri.seas.gwu.edu/sites/cspri.seas.gwu.edu/files/downloads/2010-3a_building_the_cyber_security_workforce_of_the_21st_century_1.pdf 

Homeland Security Advisory Council Cyberskills Task Force Report Fall 2012 [PDF]. (2012). U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov

Hrabowski, F. (2014, June 18). Institutional Change in Higher Education: Innovation and Collaboration. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/0161956X.2014.913440

Impact of the NSF/ATE Cybersecurity Centers on the U.S. Cybersecurity Workforce. (2014, April 3). Retrieved from https://www.nationalcyberwatch.org/resource/impact-of-the-nsfate-cybersecurity-centers-on-the-u-s-cybersecurity-workforce-2/

Information Security Scholarships | Center for Cyber Security and Education. (n.d.). Retrieved from https://iamcybersafe.org/research/

Internet Security Education. (n.d.). Retrieved from https://iamcybersafe.org/

Investing in a thriving Tech workforce pipeline for LA. (2016). Retrieved from https://data.lacity.org/stories/s/LA-Tech-Talent-Pipeline/x899-9vc5

ISACA Trust In, and Value From, Information Systems. (2017). Retrieved from https://www.isaca.org/Pages/default.aspx?cid=1000270&Appeal=SEM&gclid=CJ-zyeSsutQCFU5MDQodtfMNYg

It's not where you start – it's how you finish: Addressing the cybersecurity skills gap with a new-collar approach. (2017, March 10). Retrieved from https://www-935.ibm.com/services/us/gbs/thoughtleadership/newcollarjobs/

Jackson Higgins, K. (2017, August 4). What Women in Cybersecurity Really Think About Their Careers. Retrieved from https://www.darkreading.com/careers-and-people/what-women-in-cybersecurity-really-think-about-their-careers/d/d-id/1329560?elq_mid=79625&elq_cid=22707212&_mc=NL_DR_EDT_DR_daily_20170805&cid=NL_DR_EDT_DR_daily_20170805&elqTrackId=a3e756da49cd4f849448473f26592217&elq=010efde8dd9a4f538d7540a896447a41&elqaid=79625&elqat=1&elqCampaignId=27509

Jenkins, J. (2016, June). What Do You Want to Be? AARP Real Possibilities. Retrieved form http://www.aarp.org/politics-society/advocacy/info-2016/your-next-phase-life-reimagined-jenkins.html

Johnston, R. (2017, July 24). California groups collaborate on cybersecurity education program. Retrieved from https://edscoop.com/

Jones, E. (2016, January 14). UK Government gets serious on developing security skills in 2016. ITProPortal. Retrieved from http://www.itproportal.com/2016/01/14/uk-government-gets-serious-developing-security-skills-in-2016/

K-12 Computer Science Framework. (n.d.). Retrieved from https://k12cs.org/

K-12 Sub Working Group. (2017, July 10). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/k-12-sub-working-group

King, S. (2017). A Model for a National Cybersecurity Policy. Retrieved from https://www.linkedin.com/pulse/model-national-cybersecurity-policy-steve-king

Larson, R., Xue, Y. (2015, May). STEM crisis or STEM surplus? Yes and yes. Monthly Labor Review Bureau of Labor Statistics. Retrieved from https://www.bls.gov/opub/mlr/2015/article/stem-crisis-or-stem-surplus-yes-and-yes.htm

Libicki, M., Senty, D., Pollak, J. (n.d.). Hackers Wanted. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf

Linthicum, S. (2017). Driving an effective cybersecurity apprentice program (Part 1). Certification Magazine. Retrieved from http://certmag.com/driving-effective-cybersecurity-apprentice-program-part-1/

Linthicum, S. (2014). Formal ICT apprenticeship programs: Why not in the USA? Go Certify. Retrieved from http://www.gocertify.com/articles/formal-ict-apprenticeship-programs-why-not-in-the-usa.html

List of Cybersecurity Education and Training Providers. (n.d.). Retrieved from http://cybersecurityventures.com/cybersecurity-education/

List of Master of Science (M.S.) in Cybersecurity Degree Programs. (2017). Retrieved from http://cybersecurityventures.com/cybersecurity-university-masters-degree-programs/

Lumina Foundation Cigna Accenture. (2016, April 22). Talent Investments Pay Off (Cigna) Cigna Realizes Return on Investment from Tuition Benefits. Retrieved from https://www.luminafoundation.org/resources/talent-investments-pay-off

Lyngaas, S. (2015, August 14). A virtual community of cyber talent. FCW The Business of Federal Technology. Retrieved from https://fcw.com/articles/2015/08/14/virtual-cyber-talent.aspx

Mack, E. (2011, August 04). Top 5 Potential Cyber-Enemies for the United States. Retrieved from http://www.pcworld.com/article/237298/top_5_potential_cyber_enemies_for_the_united_states.html

Marks, J. (2017, March 02). Shoddy U.S. Cyber Deterrence Policy Emboldens Adversaries, Lawmakers Say. Retrieved from http://www.nextgov.com/cybersecurity/2017/03/shoddy-us-cyber-deterrence-policy-emboldens-adversaries-lawmakers-say/135853/

McGettrick, A. (2013, August 30). Association for Computing Machinery: Toward Curricular Guidelines for Cybersecurity. Retrieved from https://www.semanticscholar.org/

Miller, J. (2016). First-ever cyber workforce strategy aims to grow pipeline of skills. Retrieved from https://federalnewsradio.com/cybersecurity/2016/07/first-ever-cyber-workforce-strategy-aims-grow-pipeline-skills/

Morgan, S. (2017, July 20). Great big list of cybersecurity resources. Retrieved from http://www.csoonline.com/article/3209670/it-careers/great-big-list-of-cybersecurity-resources.html

Morgan, S. (2017, June 22). Cybersecurity job market to suffer severe workforce shortage 10 facts, figures and statistics summarize the cybersecurity labor market. CSO from IDG. Retrieved from http://www.csoonline.com/article/3201974/it-careers/cybersecurity-job-marketstatistics.html

Morgan, S. (2017, May 31). Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by 2021. Retrieved from http://cybersecurityventures.com/jobs/

Morgan, S. (2017, January 17). List of Women in Cybersecurity Associations to Join Now. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/

Morgan, S. (2016, April 07). African Americans Underrepresented In The Cybersecurity Field. Retrieved from https://www.forbes.com/sites/stevemorgan/2016/04/07/african-americans-underrepresented-in-the-cybersecurity-field/#18a07b3615c9

National Centers of Academic Excellence Cyber Defense. (2016, May 3). Retrieved from https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/

National Cyberwatch Center. (n.d.). National Cyberwatch Center Curriculum. Retrieved from https://www.nationalcyberwatch.org/programs-resources/curriculum/

National Institute of Standards and Technology (NIST), Baldrige Performance Excellence Program, Applied Cybersecurity Division (ITL NIST). (2017). Baldrige Cybersecurity Excellence Builder Key questions for improving your organization’s cybersecurity performance. Retrieved from https://www.nist.gov/baldrige

National Institute of Standards and Technology (NIST). (2017, August). Executive Order on Cybersecurity Workforce Request For Information Responses. Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/rfi-responses

Native Girls Code, helping diversify STEM. (2017, April 5). Retrieved from https://www.uwb.edu/news/april-2017/native-girls-code

Neal, J. (2016, March 11). Can we hire (and keep) the talent for digital government? Federal News Radio. Retrieved from https://federalnewsradio.com/commentary/2016/03/can-we-hire-and-keep-the-talent-for-digital-government/

Newhouse, B., Keith, S., Scribner, B., Witte, G. (2016, November). Draft NIST Special Publication 800-181 NICE Cybersecurity Workforce Framework (NCWF) [PDF]. NIST National Institute of Standards and Technology U.S. Department of Commerce. Retrieved from http://csrc.nist.gov/publications/drafts/800-181/sp800_181_draft.pdf

NICCS Education and Training Catalog. (n.d.). Retrieved from https://niccs.us-cert.gov/training/search#

NICE Challenge Project Enabling the Cybersecurity Workforce of Tomorrow. (n.d.). Retrieved from https://nice-challenge.com/

NICE led by National Institute for Standards and Technology (NIST) U.S. Department of Commerce. (2016). Cybersecurity Games: Building Tomorrow’s Workforce [PDF]. Retrieved from https://www.nist.gov/file/362871

NICERC Curricula. (2017). Retrieved from https://nicerc.org/curricula/

Oesch, T. (2017, May 15). Serious Games for Serious Topics: Training Cybersecurity Professionals Using AI-Powered Games. Retrieved from https://www.trainingindustry.com/it-training/articles/serious-games-for-serious-topics-training-cybersecurity-professionals-using-ai-powered-games.aspx

Office of Personal Management. (2016). Compensation Flexibilities to Recruit and Retain Cybersecurity Professionals. Retrieved from https://www.opm.gov/policy-data-oversight/pay-leave/reference-materials/handbooks/compensation-flexibilities-to-recruit-and-retain-cybersecurity-professionals.pdf

Park, M. (2017, May 8). Chance for women and minorities to enter the trillion dollar cybersecurity field Jobs gap opens opportunity for a more diverse workforce. Retrieved from http://cybersecurityventures.com/women-in-cybersecurity/

Parton, B. (2017, March 23). AF Series #1: Moving Apprenticeship Forward. Retrieved from https://www.newamerica.org

Paulsen, C., McDuffie, E., Newhouse, W., and Toth, P. (2012, June 26). NICE: Creating a Cybersecurity Workforce and Aware Public. Retrieved from http://ieeexplore.ieee.org/abstract/document/6226542/

Petrella, E. (2017, April 26). Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/regional-alliances-and-multistakeholder-partnerships-stimulate-ramps

Petrella, E. (2017, April 19). NICE Interagency Coordinating Council (ICC). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/interagency-coordinating-council

Pomerleau, M. (2016, February 4). Report outlines cyber activity from top U.S. adversaries. Retrieved from https://defensesystems.com/articles/2016/02/04/crowdstrike-cyber-report-nation-states.aspx

Pound, G. (2017, June 22). STEM verity welcomes important guests. The Union-Recorder. Retrieved from http://www.unionrecorder.com/news/stemversity-welcomes-important-guests/article_fcd96092-56b5-11e7-85cd-831ef80e4901.html

Prebil, M. (2017, June 16). Fresh Ideas for Growing Apprenticeship. Retrieved from https://www.newamerica.org

Prebil, M. (2017). Teach Cybersecurity with Apprenticeship Instead: Governments, private industry, and tech culture can all benefit from a cyber workforce built on quality apprenticeships. New America. Retrieved from https://www.newamerica.org/education-policy/edcentral/teach-cyber-apprenticeship-instead/  

Presidential Executive Order Expanding Apprenticeships in America. (2017, June 15). Retrieved from https://www.whitehouse.gov/the-press-office/2017/06/15/presidential-executive-order-expanding-apprenticeships-america

Professional Development. (2016). Retrieved from https://nicerc.org/pd/

Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making. (2013). Retrieved from https://www.nap.edu/read/18446/chapter/5

Reauthorization of Carl D. Perkins Vocational and Technical Education Act. (2007, March 16). Retrieved from https://www2.ed.gov/policy/sectech/leg/perkins/index.html

Recruiting and Retaining Cybersecurity Ninjas. (2016, October 19). Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas

Reed, D., Yung-Hsu Liu, A., Kleinman, R., Mastri, A., Reed, D., Sattar, S., Zeigler, J. (2012, July 25). An Effectiveness Assessment and Cost-Benefit Analysis of Registered Apprenticeship in 10 States. Retrieved from https://wdr.doleta.gov/research/fulltext_documents/etaop_2012_10.pdf

Reeder, F., Timlin, K., Center for Strategic and International Studies (CSIS) Strategic Technologies Program. (2016). Recruiting and Retaining Cybersecurity Ninjas. Retrieved from https://www.csis.org/analysis/recruiting-and-retaining-cybersecurity-ninjas

Reinhold, M.D. (2016). Memo. [OPM; CHCO Council]. Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act

Requirements of the Federal Cybersecurity Workforce Assessment Act. (2016, August 01). Retrieved from https://www.chcoc.gov/content/requirements-federal-cybersecurity-workforce-assessment-act

Robbins, G. (2017, April 17). Tons of $80,000 entry-level jobs going ignored. The San Diego Union Tribune. Retrieved from http://www.sandiegouniontribune.com/news/cyber-life/sd-me-connected-highered-20170417-story.html

Robinson, H. (2017, June 19). Teens join the cyber profession. Retrieved from http://www.csbj.com/2017/06/16/teens-join-cyber-profession/

Saporito, L., Blute, T., National Governors Association (2014). Federal Cybersecurity Programs: A Resource Guide. Retrieved from https://www.nga.org

Scholarships for Women Studying Information Security. (n.d.). Retrieved from http://cra.org/cra-w/scholarships-and-awards/scholarships/swsis/

Scorsone, G. (2017, July 3). Four Things You Must Do to Retain Top Tech Talent. Information Week. Retrieved from http://www.informationweek.com/strategic-cio/team-building-and-staffing/four-things-you-must-do-to-retain-top-tech-talent/a/d-id/1329241

Securing Our Future: Closing the Cybersecurity Talent Gap October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness [PDF]. (2016). Sterling, VA: Raytheon Intelligence, Information and Services. Retrieved from http://www.raytheoncyber.com/rtnwcm/groups/corporate/documents/content/rtn_335212.pdf

Senate - Homeland Security and Governmental Affairs. (2015). S.2007: Federal Cybersecurity Workforce. Assessment Act. Retrieved from https://www.congress.gov/bill/114th-congress/senate-bill/2007/text

Shark, A., Metzanbaum, S., Barquin, R., Wennergren, D. (2015, August). Increasing the Effectiveness of the Federal Role in Cybersecurity Education [Draft PDF]. National Academy of Public Administration.  Retrieved from https://www.napawash.org/uploads/Academy_Studies/Cyber-CAE-Report-FINAL…

Shinkman, P. (2016, September 29). America Is Losing the Cyber War. US News. Retrieved from https://www.usnews.com/news/articles/2016-09-29/cyber-wars-how-the-us-stacks-up-against-its-digital-adversaries

Snell, E. (2017, May 03). Addressing the Cybersecurity Skills Gap with Improved Training. Retrieved from https://healthitsecurity.com/news/addressing-the-cybersecurity-skills-gap-with-improved-training

State of Cybersecurity Implications for 2016 An ISACA and RSA Conference Survey [PDF]. (2016). RSA Conference | Where the world talks security and ISACA. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf

Steinberg, S., Schwartz, B. (2014, July 14). The Bottom Line: Apprenticeships Are Good for Business. Center for American Progress. Retrieved from https://www.americanprogress.org/issues/economy/news/2014/07/14/93768/the-bottom-line-apprenticeships-are-good-for-business/

Strategic Plan. (2017, May 05). Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/strategic-plan

Stratford, M. (2017, August 02). Congress passes $3B expansion of GI Bill education benefits. Retrieved from http://www.politico.com/story/2017/08/02/veterans-defense-gi-bill-241266

The Comprehensive National Cybersecurity Initiative [PDF]. (n.d.). Executive Office of the President of the United States. Retrieved from http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-034.pdf

The National Strategy to Secure Cyberspace [PDF]. (2003, February). US Cert. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf

The Role of Minorities and Women in Cybersecurity. (2016, April 12). Retrieved from http://www.nationalcybersecurityinstitute.org

The 2015 (ISC)2 Global Information Workforce Study [PDF]. (2015). (ISC)². Retrieved from https://www.boozallen.com/content/dam/boozallen/documents/Viewpoints/2015/04/frostsullivan-ISC2-global-information-security-workforce-2015.pdf

University of Maryland Center for Advanced Study of Language. (2016, August). Assessing aptitude for cyber operations Identifying potential candidates for the U.S. Air Force.  Retrieved from https://www.casl.umd.edu/wp-content/uploads/2017/04/DO0080_FactSheet_082016.pdf

University System of Maryland. (2011). Report of the Cyber Security Task Force [PDF]. Retrieved from https://www.usmd.edu

University of Texas at San Antonio’s (UTSA) Center for Infrastructure Assurance and Security (CIAS). (2017, August 2). Response to the NIST RFI Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: Workforce Development [PDF]. Retrieved from https://www.nist.gov/sites/default/files/documents/2017/08/02/university_of_texas_at_san_antonio.pdf

Urias, V., Leeuwen, B., Stout, W., & Lin, H. (2017, June 8). Dynamic cybersecurity training environments for an evolving cyber workforce. Retrieved from http://ieeexplore.ieee.org/document/7943509/

U.S. Department of Defense . (n.d.). Troops to Teachers . Retrieved from http://www.dodea.edu/Offices/HR/employment/troopsToTeachers.cfm

U.S Department of Homeland Security . (2016, September 20). Cybersecurity Education & Career Development. Retrieved from https://www.dhs.gov/topic/cybersecurity-education-career-development

U.S. Department of Homeland Security . (2015, November 19). Academic Engagement Results. Retrieved from https://www.dhs.gov/academic-engagement-results

U.S. Department of Homeland Security. (2015, November 12). Academic Engagement Overview. Retrieved from https://www.dhs.gov/academic-engagement-overview

U.S. Department of Homeland Security . (n.d.). Homeland Security Careers. Retrieved from https://www.dhs.gov/homeland-security-careers/hiring-event

U.S. Department of Homeland Security . (n.d.). Homeland Security Careers for Students. Retrieved from https://www.dhs.gov/homeland-security-careers/students

U.S. Department of Homeland Security . (n.d.). Student Opportunities at the Department of Homeland Security [PDF]. Retrieved from https://www.dhs.gov/homeland-security-careers/students

U.S. Department of Labor. (2017, May 11). Shareables: Get the Facts On Apprenticeship. Retrieved from https://www.dol.gov

U.S. Department of Labor Employment and Training Administration ApprenticeshipUSA. (2016). Data and Statistics. Retrieved from https://www.doleta.gov/oa/data_statistics.cfm

U.S. Department of Labor. (n.d.). Apprenticeship. Retrieved from https://www.dol.gov/apprenticeship/index.htm

Virginia Cyber Commission. (2015). Commonwealth of Virginia Cyber Security Commission “Threats and Opportunities”. Retrieved from https://www.virginia.gov/

Waterman, S. (2017, June 12). Recruitment and retention of 'cyber ninjas' doesn't have to be a dark art, report says. Retrieved from https://www.cyberscoop.com/systems-integrators-top-cybersecurity-recruitment-talent-sans-institute-report-workforce/

Watson, E. (2015, March 12). Black Colleges at the Forefront of Cybersecurity Issues. Retrieved from http://www.huffingtonpost.com/elwood-d-watson/black-colleges-at-the-forefront-of-cybersecurity-issues_b_6852334.html

Welcome to the CAE Community. (n.d.). Retrieved from https://www.caecommunity.org/

Whitehouse, S., McCaul, M., Evans, K., Bhalotra, S., Center for Strategic and International Studies (CSIS) Cyber Policy Task Force. (2017). From Awareness to Action a Cybersecurity Agenda for the 45th President. 

Why IT Matters to Higher Education: Educause Review home page. (n.d.). Retrieved from http://er.educause.edu/ 

Williams, B. D. (2017, May 26). Profiles in cyber: Understanding the US's major adversaries in cyberspace. Retrieved from https://www.fifthdomain.com

Women in Cybersecurity. (n.d.). Retrieved from https://www.csc.tntech.edu/wicys/

Women in Security and Privacy (WISP) Advancing Women to Lead the Future of Privacy and Security. (n.d.). Retrieved from http://www.wisporg.com

Women’s Society of Cyberjutsu . (n.d.). Retrieved from http://womenscyberjutsu.org/

Wong, C. (2017). Women in Cybersecurity A PROGRESSIVE MOVEMENT. Retrieved from https://resource.cobalt.io/women-in-cybersecurity-a-progressive-movement-2017

Workforce Management Sub Working Group. (2017, July 10).  Retrieved from https://www.nist.gov/itl/applied-cybersecurity/nice/about/working-group/workforce-management-sub-working-group

Yasaitis, C., LeGrand, M. (2016, July 5). Cybersecurity: A Top Priority for Airline Boards. Russell Reynolds Associates. Retrieved from http://www.russellreynolds.com/newsroom/cybersecurity-a-top-priority-for-airline-boards

Zadelhoff, M. V. (2017, May 4). Cybersecurity Has a Serious Talent Shortage. Here's How to Fix It. Retrieved from https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it

2009 Cyberspace Policy Review. (2015, August 10). Retrieved from https://www.dhs.gov/publication/2009-cyberspace-policy-review

(ISC)² Study: Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate. (2015, April 17). Retrieved from http://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html

Created December 13, 2017, Updated January 3, 2024