Enhancing the Effectiveness of Cyber Security Teams DEPARTMENT OF PSYCHOLOGY: Lois Tetrick, PhD, Reeshad Dalal, PhD, Steve Zaccaro, PhD, Julie Steinke,

Slides:



Advertisements
Similar presentations
June 28, Performance Management Overview. Performance Management Agenda Objectives Current and future environment What weve done to create future.
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Engineering Leadership
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Primary Benefit Types Value Discipline Benefits – Operating Excellence Reduce Cost Reduce Risk – Product Leadership Increase Revenue – Customer Intimacy.
DHS, National Cyber Security Division Overview
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
Improving Your Business Results Six Sigma Qualtec Six Sigma Qualtec Six Sigma Qualtec – All Rights Reserved June 26, 2002 BEYOND SIX SIGMA: A HOLISTIC.
David Kaufman Associate Administrator for Policy, Program Analysis, and International Affairs Toward More Resilient Futures: Putting Strategic Foresight.
Translating Knowledge to Action (K2A): An Organizing Framework and A Planning Tool Teresa J. Brady, PhD On behalf of the NCCDPHP Work Group on Translation.
Organization Development and Change
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Managerial Traits and Skills
Organization Development and Change
System Analysis System Analysis - Mr. Ahmad Al-Ghoul System Analysis and Design.
Human Resource Management and Strategic Human Resource Management
Coaching Workshop A good coach will make the players see what they can be rather than what they are. –Ara Parseghian ®
Team Leadership Chapter 12.
An Introduction to ICT-Infused Project Based Learning
Revised Illinois Professional Teaching Standards Rori R. Carson Western Illinois University.
Copyright © 2010 Pearson Education, Inc. Leadership in Organizations 2-1 Chapter 2 Managerial Traits and Skills.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Capable leadership is vital for meeting the challenges faced by aged care provider organisations and for the continued sustainability of the industry.
Restructuring Organizations
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Allen Hepner Senior Planning & Performance Manager September 22, 2011
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Job Analysis Employer and Employee Perspectives. Strategic Importance of Job Analysis and Competency Modeling Job analysis and competency modeling are.
Outcomes of Public Health
Chapter 11 – Team Leadership
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
1 Community-Based Care Readiness Assessment and Peer Review Team Procedures Overview Guide Department of Children and Families And Florida Mental Health.
Chapter 10 – Team Leadership
Workshop on Programming in support of Anti-Corruption Agencies Bratislava, 30 June - 1 July 2009 A methodology for capacity assessment of AC agencies:
1–1 Chapter 1 INTRODUCTION TO MANAGEMENT AND ORGANIZATIONS © Prentice Hall, 2002.
Critical Infrastructure Protection: Program Overview
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Catherine Medina, PhD, LCSW Rebecca Thomas, PhD, MSW University of Connecticut School of Social Work July 9, 2012 Joint World Conference-Sweden LEVERAGING.
DEOMI Diversity Competencies
Digital Preservation Coalition Supporting Digital Preservation NOF-digi Preservation Workshop Senior Managers’ Brief Maggie Jones DPC Co-ordinator
Club de l’IRIS Gestion des compétences Job Families Expertises & Competencies profiles June 2011.
Page 1 Strategic Foresight Initiative Summary Briefing Emergency Management Higher Education Conference June 6, :30 – 11:30 am.
Student Technology Services June Student Technology Services Team Dedicated to creating a holistic strategy to improve the technological services.
Why Community-University Partnerships? Partnerships Enhance quality of life in the region Increase relevance of academic programs Add public purposes to.
Chp. 1 - Managers & Management
Developed by: M.Salman Azhar 14-1 Organization Development and Change Session: 05 Restructuring Organizations.
Social Analysis Workshop on Country Analytical Work June 19, 2001 Anis Ahmad Dani World Bank, Social Development Department.
Discuss the analytical skills, including systems thinking, needed for a systems analyst to be successful Describe the technical skills required of a systems.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Organization Development and Change Learning Unit 14: Restructuring Organizations.
Social Work Competencies Social Work Ethics
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1 Oregon Department of Human Services Senior and People with Disabilities State Unit on Aging-ADRC In partnership with  Portland State University School.
Chapter 14: Team Leadership
INFANTRY SMALL UNIT LEADER COURSE
SAMPLE Develop a Comprehensive Competency Framework
Identify the Risk of Not Doing BA
NHN member organizations
TSMO Program Plan Development
Assist. Prof. Magy Mohamed Kandil
How to approach a top-down call topic in Horizon 2020?
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Chapter 14: Team Leadership
Continuity Guidance Circular Webinar
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Define Your IT Strategy
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MODULE 11: Creating a TSMO Program Plan
Presentation transcript:

Enhancing the Effectiveness of Cyber Security Teams DEPARTMENT OF PSYCHOLOGY: Lois Tetrick, PhD, Reeshad Dalal, PhD, Steve Zaccaro, PhD, Julie Steinke, PhD, Amber Hargrove, MA, Kristin Repchick, MA, and Shannon Schrader, BA Project Overview SAMPLE JOB AD: Analyze systems for signs of compromise Leverage tools to lead implementation and maintenance of security information and SIEM Understand security standards Design, deploy, and support complex security products Provide operational support of the infrastructure Work collaboratively with other team members and vendors Engage in critical decisions involving risk and security process improvements requiring integrity and moral character Communicate with management through presentations and reports Most job descriptions for cybersecurity positions (as well as the KSAs developed through the National Initiative for Cybersecurity Education’s National Cybersecurity Workforce Framework) focus on individual and technical aspects of the job. They often hint at the need for collaboration and communication among team members, without fully clarifying what those specific team skills are. IDENTIFIED NEED: Identification of skills and abilities that enable one to work effectively within a multi-team structure. Cognitive Knowledge, Skills, and Abilities Data Sources Total Interviewees*Teams RepresentedMultiteam Systems (MTSs) Represented *Types of CSIRTs: Government agencies, corporate, military, academic, private and public sectors. Includes US-CERT, Nationaal Cyber Security Centrum (The Netherlands), and Myndigheten för Samhällsskydd och Beredskap (Sweden). Learning Ability Problem-Solving Skills Investigative Skills Team Knowledge, Skills, and Abilities Trustworthiness Collaborative Problem- Solving Final Products Handbook for CSIRT Managers 11 chapters (e.g., CSIRTs as Multiteam Systems, Decision-Making in CSIRTs, Collaborative Problem Solving) 9 appendices (e.g., CSIRT Performance Taxonomy, Fostering External Relationships, Assessment Questions and Strategies Table) Workshops (e.g., FIRST Conference, June 2015; US-CERT, February 2016; The Netherlands, April 2016) Description of handbook, focus on CSIRT Social Maturity, interactive exercise on Collaborative Problem Solving Project Plan Cyber Security Incident Response Teams (CSIRTs) should be conceptualized as multi-team systems (MTSs), demonstrating the importance of understanding individual, within-team, and between-team interactions to be effective. We increase the understanding of CSIRT characteristics and processes (e.g., information sharing, the need to be adaptive and innovative) and factors that foster CSIRT effectiveness by conducting research that identifies individual and team knowledge, skills, and abilities (KSAs) important for effective CSIRT work. Cybersecurity Scenarios and Areas for Improvement (Examples) A social analog to Stikvoort and colleagues’ SIM3 Maturity Model. SKUE = Shared Knowledge of Unique Expertise. Intelligence Decision-Making Competence Motivation to Work on Behalf of Team Communication Skills Mentoring/coaching ability “Problem”Areas for Improvement (Relevant Handbook Chapter/Section) Policy requirements place restrictions on what and how information can be shared Understand methods of effective communication (Ch. 5) and their impact on information sharing (Ch. 6) Collaborate to solve problems (Ch. 7) across team or organizational boundaries (Ch. 2) Manage conflict based on disagreements about processes (Ch. 9) Analysts are on 12- hour shifts, leading to stress/irritability and difficulty maintaining attention within and across shifts Sustain attention and focus over time (Ch. 10) Share incident information through effective communication during shift changes (Chs. 5, 6) Preserve individual and team resilience over long periods of time (Appendix on Resilience) Manage conflict based on disagreements about processes (Ch. 9)