REWIRE Cybersecurity Skills Alliance

undefined
REWIRE
CYBERSECURITY 
SKILLS ALLIANCE
A NEW VISION FOR EUROPE
E
d
m
u
n
d
a
s
 
P
i
e
s
a
r
s
k
a
s
,
 
E
K
T
B
L
U
E
P
R
I
N
T
F
e
b
r
u
a
r
y
 
2
,
 
2
0
2
3
ECSF
 (scope & taxonomy)
Skills development strategy
Industry and policy floor
Skills seekers 
a
nd developers floor
S
e
e
k
e
r
r
o
o
m
- Entry skills set
- Career path for
u
p
 / re 
-skilling
E
d
u
c
a
t
o
r
r
o
o
m
- Curriculum designer
- Training/CyberRange/scenario
exchange
- Certification schemas
-
Skills need trends
 
reports
-
Job analyzer
-
Education tracking
P
o
l
i
c
y
r
o
o
m
I
n
d
u
s
t
r
y
r
o
o
m
- Competence management
- Minimum skills
Support terrace
- Job descriptions
-
Best practice /
examples
Support terrace
- Advertising materials
- Curriculum designer
-
Best practice /
examples
REWIRE CYBERSECURITY SKILLS
BLUEPRINT
SKILLS INTELLIGENCE
“Skills intelligence 
is the outcome of an 
expert-
driven process
 of 
identifying, analysing,
synthesising and presenting
 quantitative and/or
qualitative skills and labour market information.
To remain relevant, skills intelligence must be kept
up-to-date and adjusted when user needs change.
This requires the expert-driven process to be
continuous and iterative.”
Source: CEDEFOP, 
Crafting skills intelligence |
CEDEFOP (europa.eu)
SKILLS INTELLIGENCE
The REWIRE project has created a plan to identify, analyze, synthesize
and present cybersecurity skills information
-
a
s
 
c
o
n
c
e
i
v
e
d
 
a
t
 
t
h
e
 
b
e
g
i
n
n
i
n
g
 
o
f
 
t
h
e
 
p
r
o
j
e
c
t
,
 
 
(
t
h
e
n
)
-
a
s
 
e
v
o
l
v
e
d
 
d
u
r
i
n
g
 
t
h
e
 
l
i
f
e
t
i
m
e
 
o
f
 
t
h
e
 
p
r
o
j
e
c
t
 
 
(
n
o
w
)
 
a
n
d
-
a
s
 
e
n
v
i
s
i
o
n
e
d
 
t
o
 
b
e
c
o
m
e
 
i
n
 
t
h
e
 
f
u
t
u
r
e
 
(
t
o
m
o
r
r
o
w
)
.
CYBERSECURITY SKILLS (
Then) (1)
T
h
e
 
p
r
o
j
e
c
t
 
r
e
s
e
a
r
c
h
e
d
,
 
i
d
e
n
t
i
f
i
e
d
 
a
n
d
 
a
n
a
l
y
z
e
d
 
a
l
r
e
a
d
y
 
e
s
t
a
b
l
i
s
h
e
d
c
y
b
e
r
s
e
c
u
r
i
t
y
 
s
k
i
l
l
s
 
f
r
a
m
e
w
o
r
k
s
 
f
r
o
m
 
v
a
r
i
o
u
s
 
s
o
u
r
c
e
s
 
(
n
a
t
i
o
n
a
l
,
i
n
t
e
r
n
a
t
i
o
n
a
l
,
 
p
u
b
l
i
c
,
 
p
r
i
v
a
t
e
)
.
T
h
e
 
r
e
s
u
l
t
s
 
o
f
 
t
h
i
s
 
a
n
a
l
y
s
i
s
 
a
r
e
 
i
n
c
l
u
d
e
d
 
i
n
-
D
e
l
i
v
e
r
a
b
l
e
 
R
2
.
2
.
2
.
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
S
k
i
l
l
s
 
N
e
e
d
s
 
A
n
a
l
y
s
i
s
 
a
n
d
-
t
h
e
 
1
s
t
 
i
t
e
r
a
t
i
o
n
 
o
f
 
t
h
e
 
R
5
.
4
.
1
 
P
o
l
i
c
y
 
R
e
c
o
m
m
e
n
d
a
t
i
o
n
s
.
CYBERSECURITY SKILLS (
Then) (2)
Key aspects:
a
 
l
a
c
k
 
o
f
 
s
k
i
l
l
e
d
 
a
n
d
 
q
u
a
l
i
f
i
e
d
 
p
e
r
s
o
n
n
e
l
.
m
u
l
t
i
t
u
d
e
 
o
f
 
f
i
e
l
d
s
 
(
f
o
l
l
o
w
i
n
g
 
t
h
e
 
d
i
v
e
r
s
i
t
y
 
o
f
 
c
y
b
e
r
s
e
c
u
r
i
t
y
a
s
 
a
 
t
o
p
i
c
)
 
a
n
d
 
a
r
e
 
t
e
c
h
n
i
c
a
l
 
a
n
d
 
o
r
g
a
n
i
z
a
t
i
o
n
a
l
 
i
n
 
n
a
t
u
r
e
Source: 
 
R5.4.1 Policy Recommendations
 
Role
Profiles
Career
paths
Structure
SME
focus
Levels
CYBERSECURITY SKILLS (
Then) (3)
I
n
 
R
2
.
2
.
2
.
 
C
y
b
e
r
s
e
c
u
r
i
t
y
S
k
i
l
l
s
 
N
e
e
d
s
 
A
n
a
l
y
s
i
s
 
t
h
e
p
r
o
p
o
s
e
d
 
b
y
 
t
h
e
 
R
E
W
I
R
E
p
r
o
j
e
c
t
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
S
k
i
l
l
s
c
a
t
e
g
o
r
i
e
s
 
a
r
e
 
i
n
t
r
o
d
u
c
e
d
f
o
l
l
o
w
i
n
g
 
t
h
e
 
r
e
l
e
v
a
n
t
s
t
a
k
e
h
o
l
d
e
r
,
 
p
i
l
o
t
 
p
r
o
j
e
c
t
a
n
d
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
s
k
i
l
l
s
f
r
a
m
e
w
o
r
k
 
a
n
a
l
y
s
i
s
.
CYBERSECURITY SKILLS (
Now)
In May 2022 the REWIRE project
completed an extensive analysis of the
0.5 version of the European
Cybersecurity Skills Framework.
The results of this analysis as well as
the project’s recommendations are
included in deliverable 
R3.3.1
Cybersecurity skills Framework
.
CYBERSECURITY SKILLS (
Now) (2)
The REWIRE project is currently completing
also the analysis of V1.0 of the ECSF
(published in September 2022).
Addition to ECSF v0.5
Adaptation or change
Removal
Sumbols used to denote
changes proposed by REWIRE:
CYBERSECURITY SKILLS (
Tomorrow)
In 
R.2.2.3. Methodology to anticipate future needs
the project proposed a methodology to facilitate the
identification of future needs based also on inputs
from specific stakeholders and the market.
T
h
e
 
R
E
W
I
R
E
 
p
r
o
j
e
c
t
 
h
a
s
 
a
l
r
e
a
d
y
 
c
r
e
a
t
e
d
 
a
 
t
o
o
l
C
y
b
e
r
s
e
c
u
r
i
t
y
 
J
o
b
 
A
d
s
 
A
n
a
l
y
z
e
r
.
 
T
h
i
s
 
t
o
o
l
 
h
e
l
p
s
i
n
 
t
h
e
 
p
r
o
c
e
s
s
i
n
g
 
o
f
 
i
n
f
o
r
m
a
t
i
o
n
 
f
o
r
m
 
J
o
b
 
a
d
s
 
a
n
d
t
h
e
 
e
x
t
r
a
c
t
i
o
n
 
o
f
 
i
n
f
o
r
m
a
t
i
o
n
 
o
n
 
c
u
r
r
e
n
t
 
a
n
d
e
m
e
r
g
i
n
g
 
s
k
i
l
l
s
 
n
e
e
d
s
.
 
C
u
r
r
e
n
t
l
y
 
3
0
0
+
 
a
d
s
 
h
a
v
e
b
e
e
n
 
a
n
a
l
y
z
e
d
.
 
M
o
r
e
 
b
e
i
n
g
 
p
r
o
c
e
s
s
e
d
.
CYBERSECURITY SKILLS STRATEGY
“Sector Skills Strategies are “road maps” developed by business, labour,
education providers, government departments, development agencies and
community organisations within a single industry or economic sector to
improve workforce skills, nurture talent pipe-lines, foster competitiveness,
grow businesses and expand.”
The first step undertaken by the REWIRE project in the process of creating the
strategy was a PESTLE analysis.
 
Source: https://frresearch.co.za/creating-sector-skills-strategies-that-work/
Economic
Social
Legal
Political
Environ
mental
PESTLE Analysis on Cybersecurity Education / Gaps
Techno
logical
31 Aspects
7
6
5
5
3
5
4 Gap drivers
3 Strategic Needs
STRATEGIC PRIORITIES
STRATEGIC OBJECTIVES
18 Supporting Actions
Strategy
Strategy
W
H
A
T
 
I
S
 
I
T
?
P
E
S
T
L
E
 
a
n
a
l
y
s
i
s
 
a
l
l
o
w
s
 
f
o
r
 
i
d
e
n
t
i
f
y
i
n
g
 
s
k
i
l
l
s
 
s
h
o
r
t
a
g
e
s
,
 
g
a
p
s
,
 
a
n
d
 
m
i
s
m
a
t
c
h
e
s
,
 
n
a
m
e
l
y
 
a
s
p
e
c
t
s
,
 
a
f
f
e
c
t
i
n
g
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
e
d
u
c
a
t
i
o
n
 
f
r
o
m
 
d
i
f
f
e
r
e
n
t
a
n
g
l
e
s
.
 
W
H
Y
:
A
 
s
k
i
l
l
 
s
t
r
a
t
e
g
y
 
c
a
n
 
b
e
 
d
e
v
e
l
o
p
e
d
 
f
r
o
m
 
t
h
e
s
e
 
a
s
p
e
c
t
s
 
c
l
a
s
s
i
f
i
c
a
t
i
o
n
.
THE STRATEGIC NEEDS
a) Need to increase the
supply for cybersecurity
skills development
b) Need to transform the
demand for cybersecurity
skills
c) Need to transform the
inventory of cybersecurity
skills development
 
Supply
Demand
Simplification
STRATEGIC NEED A
STRATEGIC
NEEDS
STRATEGIC
PRIORITIES
STRATEGIC
OBJECTIVES
Need to increase the supply for cybersecurity skills development
 
 
Increase the number of candidates for cybersecurity training
Transforming and repositioning (rebranding) cybersecurity
STRATEGIC NEED B
STRATEGIC
NEEDS
STRATEGIC
PRIORITIES
STRATEGIC
OBJECTIVES
Need to transform the demand foy cybersecurity skills
 
 
Defining cybersecurity as a significant function of an organization
Enhance understanding of cybersecurity threats
Strengthen cooperation between training organizations and industry
Fostering integration of cybersecurity with business agenda
STRATEGIC NEED 
C
STRATEGIC
NEEDS
STRATEGIC
PRIORITIES
STRATEGIC
OBJECTIVES
Need to transform the inventory of cybersecurity skills development
Support the development of training measures
Establish common cybersecurity training standards
Model effective cybersecurity training
Transforming cybersecurity skills development to make them better
structured and more simplified
STRATEGIC
PRIORITIES
STRATEGIC
OBJECTIVES
 
STRATEGIC
OBJECTIVES &
SUPPORTING
ACTIONS
5
.
 
S
U
P
P
O
R
T
 
T
H
E
 
D
E
V
E
L
O
P
M
E
N
T
 
O
F
T
R
A
I
N
I
N
G
 
M
E
A
S
U
R
E
S
5.1. Facilitate creation of standardized and
exchangeable training scenarios
5.2. Support the development of training
platforms
5.3. Support the continuous professional
development of trainers
 
6. ESTABLISH COMMON CYBERSECURITY
TRAINING STANDARDS
6.1. Design of a European skills framework
for cybersecurity
6.2. Develop cybersecurity skills and
degrees certification scheme
4
.
 
S
T
R
E
N
G
T
H
E
N
 
C
O
O
P
E
R
A
T
I
O
N
 
B
E
T
W
E
E
N
I
N
D
U
S
T
R
Y
 
A
N
D
 
T
R
A
I
N
I
N
G
 
O
R
G
A
N
I
Z
A
T
I
O
N
S
4.1. Engage different stakeholders in
identification of different cybersecurity skills
4.2. Engage industry in validation of different
skills
4.3. Engage industry in delivering training in
cooperation with HEIs
4.4. Support cooperation between training
organizations and industry
2. ENHANCING UNDERSTANDING
OF CYBERSECURITY THREATS
2.1. Provide regular analysis
on cybersecurity threats
3. DEFINE CYBERSECURITY AS A SIGNIFICANT
FUNCTION OF AN ORGANIZATION
3.1. Making it easier to access, understand
and use cybersecurity tooling
3.2. Fostering cybersecurity aspect
inclusion in business models, planning,
assessment and other instruments
1
.
 
I
N
C
R
E
A
S
E
 
T
H
E
 
N
U
M
B
E
R
 
O
F
C
A
N
D
I
D
A
T
E
S
 
F
O
R
 
C
Y
B
E
R
S
E
C
U
R
I
T
Y
T
R
A
I
N
I
N
G
1.1. Rebrand cybersecurity
1.2. Promote cybersecurity as a career
choice
1.3. Promote cybersecurity in higher
education
7. MODEL EFFECTIVE CYBERSECURITY
TRAINING
7.1. Improve re-skilling and up-skilling for cybersecurity
7.2. Increase accessibility of cybersecurity training
7.3. Continuous training of specific target groups
 
ECSF
 (scope & taxonomy)
Skills development strategy
Industry and policy floor
Skills seekers 
a
nd developers floor
S
e
e
k
e
r
r
o
o
m
- Entry skills set
- Career path for
u
p
 / re 
-skilling
E
d
u
c
a
t
o
r
r
o
o
m
- Curriculum designer
- Training/CyberRange/scenario
exchange
- Certification schemas
-
Skills need trends
 
reports
-
Job analyzer
-
Education tracking
P
o
l
i
c
y
r
o
o
m
I
n
d
u
s
t
r
y
r
o
o
m
- Competence management
- Minimum skills
Support terrace
- Job descriptions
-
Best practice /
examples
Support terrace
- Advertising materials
- Curriculum designer
-
Best practice /
examples
REWIRE CYBERSECURITY SKILLS
BLUEPRINT
T
h
e
 
C
y
b
e
r
A
B
I
L
I
T
Y
p
l
a
t
f
o
r
m
7.2. INCREASE ACCESSIBILITY OF
CYBERSECURITY TRAINING
Publicly available tool that will try to address
lack of existing information on cybersecurity
skills, trainings and certifications
The tool will incorporate the information from the
career map and the training and certification
interconnection tool to provide information to all
interested parties
T
h
e
 
C
y
b
e
r
A
B
I
L
I
T
Y
 
p
l
a
t
f
o
r
m
T
H
A
N
K
 
Y
O
U
Speaker/Presenter (Full Name): Edmundas Piesarskas
Role in the Organisation: active in all WP’s
Organisation, Country: UAB Ekonomin
ės konsultacijos ir tyrimai (EKT)
E-mail address: e
dmundas
@ekt.lt
More information:
www.rewireproject.eu/
https://www.linkedin.com/company/rewireprojecteu/
Slide Note
Embed
Share

REWIRE Cybersecurity Skills Blueprint and the Skills Intelligence behind it, as well as the key aspects of cybersecurity skills and the proposed categories for future development.


Uploaded on Dec 21, 2023 | 2 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. REWIRE CYBERSECURITY SKILLS ALLIANCE A NEW VISION FOR EUROPE Edmundas Piesarskas, EKT BLUEPRINT February 2, 2023

  2. REWIRE CYBERSECURITY SKILLS BLUEPRINT Support terrace - Job descriptions Industry and policy floor Industry room - Best practice / examples Policy room Skills development strategy ECSF (scope & taxonomy) Support terrace Educator room Seeker room - Advertising materials - Curriculum designer - Best practice / examples Skills seekers and developers floor

  3. SKILLS INTELLIGENCE Skills intelligence is the outcome of an expert- driven process of identifying, analysing, synthesising and presenting quantitative and/or qualitative skills and labour market information. To remain relevant, skills intelligence must be kept up-to-date and adjusted when user needs change. This requires the expert-driven process to be continuous and iterative. Source: CEDEFOP, Crafting skills intelligence | CEDEFOP (europa.eu)

  4. SKILLS INTELLIGENCE The REWIRE project has created a plan to identify, analyze, synthesize and present cybersecurity skills information - as conceived at the beginning of the project, (then) - as evolved during the lifetime of the project (now) and - as envisioned to become in the future (tomorrow).

  5. CYBERSECURITY SKILLS (Then) (1) The project researched, identified and analyzed already established cybersecurity skills frameworks from various sources (national, international, public, private). The results of this analysis are included in - Deliverable R2.2.2. Cybersecurity Skills Needs Analysis and - the 1stiteration of the R5.4.1 Policy Recommendations.

  6. CYBERSECURITY SKILLS (Then) (2) Key aspects: a lack of skilled and qualified personnel. multitude of fields (following the diversity of cybersecurity as a topic) and are technical and organizational in nature Source: R5.4.1 Policy Recommendations SME focus Role Profiles Career paths Structure Levels

  7. CYBERSECURITY SKILLS (Then) (3) In R2.2.2. Cybersecurity Skills Needs Analysis the proposed by the REWIRE project Cybersecurity Skills categories are introduced following the relevant stakeholder, pilot project and cybersecurity skills framework analysis.

  8. CYBERSECURITY SKILLS (Now) In May 2022 the REWIRE project completed an extensive analysis of the 0.5 version of the European Cybersecurity Skills Framework. The results of this analysis as well as the project s recommendations are included in deliverable R3.3.1 Cybersecurity skills Framework.

  9. CYBERSECURITY SKILLS (Now) (2) Sumbols used to denote changes proposed by REWIRE: Addition to ECSF v0.5 Adaptation or change Removal The REWIRE project is currently completing also the analysis of V1.0 of the ECSF (published in September 2022).

  10. CYBERSECURITY SKILLS (Tomorrow) In R.2.2.3. Methodology to anticipate future needs the project proposed a methodology to facilitate the identification of future needs based also on inputs from specific stakeholders and the market. The REWIRE project has already created a tool Cybersecurity Job Ads Analyzer. This tool helps in the processing of information form Job ads and the extraction of information on current and emerging skills needs. Currently 300+ ads have been analyzed. More being processed.

  11. CYBERSECURITY SKILLS STRATEGY Sector Skills Strategies are road maps developed by business, labour, education providers, government departments, development agencies and community organisations within a single industry or economic sector to improve workforce skills, nurture talent pipe-lines, foster competitiveness, grow businesses and expand. The first step undertaken by the REWIRE project in the process of creating the strategy was a PESTLE analysis. Source: https://frresearch.co.za/creating-sector-skills-strategies-that-work/

  12. PESTLE Analysis on Cybersecurity Education / Gaps Techno logical Environ mental Political Economic Social Legal 31 Aspects 5 7 6 5 5 3 4 Gap drivers 3 Strategic Needs STRATEGIC PRIORITIES STRATEGIC OBJECTIVES Strategy Strategy 18 Supporting Actions

  13. WHAT IS IT? PESTLE analysis allows for identifying skills shortages, gaps, and mismatches, namely aspects, affecting cybersecurity education from different angles. WHY: A skill strategy can be developed from these aspects classification.

  14. THE STRATEGIC NEEDS a) Need to increase the supply for cybersecurity skills development b) Need to transform the demand for cybersecurity skills c) Need to transform the inventory of cybersecurity skills development Supply Demand Simplification

  15. STRATEGIC NEED A STRATEGIC NEEDS Need to increase the supply for cybersecurity skills development STRATEGIC PRIORITIES Transforming and repositioning (rebranding) cybersecurity STRATEGIC OBJECTIVES Increase the number of candidates for cybersecurity training

  16. STRATEGIC NEED B STRATEGIC NEEDS Need to transform the demand foy cybersecurity skills STRATEGIC PRIORITIES Fostering integration of cybersecurity with business agenda Defining cybersecurity as a significant function of an organization Enhance understanding of cybersecurity threats Strengthen cooperation between training organizations and industry STRATEGIC OBJECTIVES

  17. STRATEGIC NEED C STRATEGIC NEEDS Need to transform the inventory of cybersecurity skills development Transforming cybersecurity skills development to make them better structured and more simplified STRATEGIC STRATEGIC PRIORITIES PRIORITIES Support the development of training measures Establish common cybersecurity training standards Model effective cybersecurity training STRATEGIC STRATEGIC OBJECTIVES OBJECTIVES

  18. 4. STRENGTHEN COOPERATION BETWEEN INDUSTRY AND TRAINING ORGANIZATIONS 1. INCREASE THE NUMBER OF CANDIDATES FOR CYBERSECURITY TRAINING 1.1. Rebrand cybersecurity 1.2. Promote cybersecurity as a career choice 1.3. Promote cybersecurity in higher education 4.1. Engage different stakeholders in identification of different cybersecurity skills 4.2. Engage industry in validation of different skills 4.3. Engage industry in delivering training in cooperation with HEIs 4.4. Support cooperation between training organizations and industry STRATEGIC OBJECTIVES & 2. ENHANCING UNDERSTANDING OF CYBERSECURITY THREATS SUPPORTING 5. SUPPORT THE DEVELOPMENT OF TRAINING MEASURES 5.1. Facilitate creation of standardized and exchangeable training scenarios 5.2. Support the development of training platforms 5.3. Support the continuous professional development of trainers 2.1. Provide regular analysis on cybersecurity threats ACTIONS 3. DEFINE CYBERSECURITY AS A SIGNIFICANT FUNCTION OF AN ORGANIZATION 3.1. Making it easier to access, understand and use cybersecurity tooling 3.2. Fostering cybersecurity aspect inclusion in business models, planning, assessment and other instruments 6. ESTABLISH COMMON CYBERSECURITY TRAINING STANDARDS 6.1. Design of a European skills framework for cybersecurity 6.2. Develop cybersecurity skills and degrees certification scheme 7. MODEL EFFECTIVE CYBERSECURITY TRAINING 7.1. Improve re-skilling and up-skilling for cybersecurity 7.2. Increase accessibility of cybersecurity training 7.3. Continuous training of specific target groups

  19. REWIRE CYBERSECURITY SKILLS BLUEPRINT Support terrace - Job descriptions Industry and policy floor Industry room - Best practice / examples Policy room Skills development strategy ECSF (scope & taxonomy) Support terrace Educator room Seeker room - Advertising materials - Curriculum designer - Best practice / examples The CyberABILITY platform Skills seekers and developers floor

  20. 7.2. INCREASE ACCESSIBILITY OF CYBERSECURITY TRAINING Publicly available tool that will try to address lack of existing information on cybersecurity skills, trainings and certifications The tool will incorporate the information from the career map and the training and certification interconnection tool to provide information to all interested parties The CyberABILITY platform

  21. THANK YOU More information: www.rewireproject.eu/ https://www.linkedin.com/company/rewireprojecteu/ Speaker/Presenter (Full Name): Edmundas Piesarskas Role in the Organisation: active in all WP s Organisation, Country: UAB Ekonomin s konsultacijos ir tyrimai (EKT) E-mail address: edmundas@ekt.lt

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#