Executive Cyber Leadership

Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related resources and/or operations.

Below are the Knowledge, Skills, Abilities and Tasks identified as being required to perform this work role.

CoursesDESCRIPTION
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0003Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004Knowledge of cybersecurity and privacy principles.
K0005Knowledge of cyber threats and vulnerabilities.
K0006Knowledge of specific operational impacts of cybersecurity lapses.
K0009Knowledge of application vulnerabilities.
K0070Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
K0106Knowledge of what constitutes a network attack and a network attack??s relationship to both threats and vulnerabilities.
K0147Knowledge of emerging security issues, risks, and vulnerabilities.
K0296Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
K0314Knowledge of industry technologies?? potential cybersecurity vulnerabilities.
K0624Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
K0628Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
IDDESCRIPTION
S0018Skill in creating policies that reflect system security objectives.
S0356Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).
S0357Skill to anticipate new security threats.
S0358Skill to remain aware of evolving technical infrastructures.
S0359Skill to use critical thinking to analyze organizational patterns and relationships.
IDDESCRIPTION
A0033Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.
A0070Ability to apply critical reading/thinking skills.
A0085Ability to exercise judgment when policies are not well-defined.
A0094Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
A0105Ability to tailor technical and planning information to a customer??s level of understanding.
A0106Ability to think critically.
A0116Ability to prioritize and allocate cybersecurity resources correctly and efficiently.
A0117Ability to relate strategy, business, and technology in the context of organizational dynamics.
A0118Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
A0119Ability to understand the basic concepts and issues related to cyber and its organizational impact.
A0129Ability to ensure information security management processes are integrated with strategic and operational planning processes.
A0130Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control.
IDDESCRIPTION
T001Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
T0002Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
T0004Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.
T0006Advocate organization’s official position in legal and legislative proceedings.
T0025Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
T0066Develop and maintain strategic plans.
T0130Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.
T0134Lead and align information technology (IT) security priorities with the security strategy.
T0135Lead and oversee information security budget, staffing, and contracting.
T0148Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.
T0151Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure that they provide the intended level of protection.
T0227Recommend policy and coordinate review and approval.
T0229Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
T0248Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.
T0254Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
T0263Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle.
T0264Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
T0282Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.
T0337Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel.
T0356Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets.
T0429Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.
T0445Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization¡¯s strategic plan.
T0509Perform an information security risk assessment.
T0763Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.
T0871Collaborate on cyber privacy and security policies and procedures
T0872Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation
T0927Appoint and guide a team of IT security experts.
T0928Collaborate with key stakeholders to establish a cybersecurity risk management program.