Abstract
Many organizations struggle with cyber security issues and the demands on protecting corporate assets. Finding high quality candidates for a cyber talent “pipeline” can be a challenge. Many potential employees claim to have knowledge relating to this field, made apparent by the abundance of certification acronyms present on many resumes. In order to better assess this field of applicants, the interview process can be augmented through the process of gamification, whereby applicants are asked to prove their technical abilities by competing in a hands-on capture-the-flag style competition. In this paper, I discuss an approach currently used by MITRE to build a corporate talent pipeline in cyber security through the use of challenge competitions across high school, university and professional levels. I provide updated results based on using this approach over the span of several years.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
(ISC)2 - IT Certification and Security Experts (n.d.). https://www.isc2.org/. Accessed 22 Apr 2015
ACT: The Condition of College & Career Readiness (2013). http://doi.org/10.1037/e725652011-001
Alexander, D.: Cyber threats in the 21st century. Secur. Solut. Enterp. Secur. Lead. 49(9), 70–76 (2012)
Amoroso, E.G.: Cyber attacks: awareness. Netw. Secur. 2011(1), 10–16 (2011)
Bekrar, S., Bekrar, C., Groz, R., Mounier, L.: Finding software vulnerabilities by smart fuzzing. In: Proceedings of the 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011, pp. 427–430 (2011). http://doi.org/10.1109/ICST.2011.48
Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719–731 (2011). https://doi.org/10.1016/j.cose.2011.08.004
Colbaugh, R., Glass, K.: Proactive defense for evolving cyber threats. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, pp. 125–130 (2011). http://doi.org/10.1109/ISI.2011.5984062
Cherinka, R., Prezzama, J.: A model for building a cybersecurity talent pipeline. In: 19th World Multi-Conference on Systemics, Cybernetics and Informatics, July 2015
Cherinka, P.W., Prezzama, J.: Fostering partnerships between industry and academia to promote STEM at the secondary educational level. In: EEET Plenary Presentation, July 2012
Conger, J.A., Fulmer, R.M.: Developing your leadership pipeline. Harvard Bus. Rev. 81, 76 (2003)
Department of Homeland Security: Blueprint for a Secure Cyber Future: The Cyber Security Strategy for the Homeland Security Enterprise, November 2011. http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf
Kapitzke, C., Dezuanni, M., Iyer, R.: Copyrights and creative commons licensing: pedagogical innovation in a higher education media literacy classroom. E Learn. Digit. Media 8(3), 271–282 (2011). https://doi.org/10.2304/elea.2011.8.3.271
LeClare, J., Keeley, G.: Cyber Security in our Digital Lives. Hudson Whitman, Excelsior College Press (2015)
MITRE Capture the Flag Competition (CTF), The MITRE Cyber Academy, The MITRE Corporation (2014). www.mitrecyberacademy.org
MITRE Cyber Interns Make the Most of Summer (n.d.). https://www.mitre.org/careers/student-programs/student-voices/mitre-cyber-interns-make-the-most-of-summer
George, R.: Strengthening Cyber Security is Key …”, National Security Agency National Information Assurance Education and Training Program (2010). https://www.nsa.gov/ia/news/2010/cyber_security_education.shtml
The National Cyber League (NCL) 2015 Fall Season Games (n.d.). http://www.nationalcyberleague.org/games.shtml. Accessed 22 Apr 22 2015
Open Security Training (n.d.). http://opensecuritytraining.info/Welcome.html. Accessed 22 Apr 22 2015
White, G.B.: The community cyber security maturity model. In: 2011 IEEE International Conference on Technologies for Homeland Security, HST 2011, pp. 173–178 (2011). http://doi.org/10.1109/THS.2011.6107866
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Cherinka, R. (2019). Using Cyber Competitions to Build a Cyber Security Talent Pipeline and Skilled Workforce. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857. Springer, Cham. https://doi.org/10.1007/978-3-030-01177-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-01177-2_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01176-5
Online ISBN: 978-3-030-01177-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)