Description
Join Bill Bonney, Matt Stamper, and Gary Hayslip and contributing scholars for this next volume in the 15 time award winning series as they discuss current research regarding the challenges of the world of cybersecurity and its effects in and on the marketplace. This volume contains research shaping the conversation regarding what the future may hold to protect businesses and consumers regarding the perils of digital technology. As you read the pages ahead, we ask you to ask yourself: "What should I be doing to make a safer cyber world?" This is critically important if we're to reap the benefits promised in this new digital age.
Cyber war is an emerging threat to the United States in the new cyber frontier. Cyberspace is relatively new, and billions of users have access to the Internet. With a low barrier to entry for potential attackers, protecting critical military and civilian assets is a top priority. The Cybersecurity Commission for the state of Virginia estimated 30,000 cybersecurity related unfilled cybersecurity positions across the state. The U.S. Department of Defense (DoD) is not immune to the problems in hiring cybersecurity professionals. The purpose of this paper is to present research about hiring cybersecurity professionals for DoD. The research explored tactics and techniques used by hiring managers in Virginia to hire cybersecurity professionals for DoD contracts. Successfully hiring cybersecurity professionals to fill contract positions is possible if the contracting organizations maintain the requirements of the contract and develop a strong recruitment process. DoD currently hires contractors to conduct parts of the cybersecurity mission, but it may serve the U.S. better if the DoD changes the focus to building a cybersecurity workforce that is tailored to the type of cybersecurity professionals they need. The current cyber workforce in the United States is weak and a new innovative hiring process may enhance the cybersecurity workforce. A different approach to cybersecurity hiring could enhance the cybersecurity capabilities of the DoD. The DoD needs to take measures, some immediate and some over time, to strengthen their ability to protect information and information systems.
Marketing video: https://www.youtube.com/watch?v=UqW8UN8A-gc
Tag This Book
This Book Has Been Tagged
Our Recommendation
Notify Me When The Price...
Log In to track this book on eReaderIQ.
Track These Authors
Log In to track Dr. Adam Pierce on eReaderIQ.
Log In to track Dr. Cheryl A. Lentz on eReaderIQ.
Log In to track Bill Bonney on eReaderIQ.
Log In to track Gary Hayslip on eReaderIQ.
Log In to track Matt Stamper on eReaderIQ.