Skip to main content

Using Cyber Competitions to Build a Cyber Security Talent Pipeline and Skilled Workforce

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 857))

Included in the following conference series:

Abstract

Many organizations struggle with cyber security issues and the demands on protecting corporate assets. Finding high quality candidates for a cyber talent “pipeline” can be a challenge. Many potential employees claim to have knowledge relating to this field, made apparent by the abundance of certification acronyms present on many resumes. In order to better assess this field of applicants, the interview process can be augmented through the process of gamification, whereby applicants are asked to prove their technical abilities by competing in a hands-on capture-the-flag style competition. In this paper, I discuss an approach currently used by MITRE to build a corporate talent pipeline in cyber security through the use of challenge competitions across high school, university and professional levels. I provide updated results based on using this approach over the span of several years.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. (ISC)2 - IT Certification and Security Experts (n.d.). https://www.isc2.org/. Accessed 22 Apr 2015

  2. ACT: The Condition of College & Career Readiness (2013). http://doi.org/10.1037/e725652011-001

  3. Alexander, D.: Cyber threats in the 21st century. Secur. Solut. Enterp. Secur. Lead. 49(9), 70–76 (2012)

    Google Scholar 

  4. Amoroso, E.G.: Cyber attacks: awareness. Netw. Secur. 2011(1), 10–16 (2011)

    Article  Google Scholar 

  5. Bekrar, S., Bekrar, C., Groz, R., Mounier, L.: Finding software vulnerabilities by smart fuzzing. In: Proceedings of the 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011, pp. 427–430 (2011). http://doi.org/10.1109/ICST.2011.48

  6. Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719–731 (2011). https://doi.org/10.1016/j.cose.2011.08.004

    Article  Google Scholar 

  7. Colbaugh, R., Glass, K.: Proactive defense for evolving cyber threats. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, pp. 125–130 (2011). http://doi.org/10.1109/ISI.2011.5984062

  8. Cherinka, R., Prezzama, J.: A model for building a cybersecurity talent pipeline. In: 19th World Multi-Conference on Systemics, Cybernetics and Informatics, July 2015

    Google Scholar 

  9. Cherinka, P.W., Prezzama, J.: Fostering partnerships between industry and academia to promote STEM at the secondary educational level. In: EEET Plenary Presentation, July 2012

    Google Scholar 

  10. Conger, J.A., Fulmer, R.M.: Developing your leadership pipeline. Harvard Bus. Rev. 81, 76 (2003)

    Google Scholar 

  11. Department of Homeland Security: Blueprint for a Secure Cyber Future: The Cyber Security Strategy for the Homeland Security Enterprise, November 2011. http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf

  12. Kapitzke, C., Dezuanni, M., Iyer, R.: Copyrights and creative commons licensing: pedagogical innovation in a higher education media literacy classroom. E Learn. Digit. Media 8(3), 271–282 (2011). https://doi.org/10.2304/elea.2011.8.3.271

    Article  Google Scholar 

  13. LeClare, J., Keeley, G.: Cyber Security in our Digital Lives. Hudson Whitman, Excelsior College Press (2015)

    Google Scholar 

  14. MITRE Capture the Flag Competition (CTF), The MITRE Cyber Academy, The MITRE Corporation (2014). www.mitrecyberacademy.org

  15. MITRE Cyber Interns Make the Most of Summer (n.d.). https://www.mitre.org/careers/student-programs/student-voices/mitre-cyber-interns-make-the-most-of-summer

  16. George, R.: Strengthening Cyber Security is Key …”, National Security Agency National Information Assurance Education and Training Program (2010). https://www.nsa.gov/ia/news/2010/cyber_security_education.shtml

  17. The National Cyber League (NCL) 2015 Fall Season Games (n.d.). http://www.nationalcyberleague.org/games.shtml. Accessed 22 Apr 22 2015

  18. Open Security Training (n.d.). http://opensecuritytraining.info/Welcome.html. Accessed 22 Apr 22 2015

  19. White, G.B.: The community cyber security maturity model. In: 2011 IEEE International Conference on Technologies for Homeland Security, HST 2011, pp. 173–178 (2011). http://doi.org/10.1109/THS.2011.6107866

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Cherinka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cherinka, R. (2019). Using Cyber Competitions to Build a Cyber Security Talent Pipeline and Skilled Workforce. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857. Springer, Cham. https://doi.org/10.1007/978-3-030-01177-2_20

Download citation

Publish with us

Policies and ethics