FISSEA Conference 2004 Developing Role-based Learning Activities U.S. Department of State.

Slides:



Advertisements
Similar presentations
Module N° 7 – SSP training programme
Advertisements

Job Descriptions Presented by: Peggy Accuardi Compensation 1.
SUMMER Internship Marks Allocation 2 Marking CriteriaMarks Allocated Workshops (4 in total)4*5 = 20 marks Academic Supervisor Attendance5 Report.
IT Governance and Management
Job Analysis and Rewards
5-1 Closing. 5-2 Module Objectives  Review course objectives  Discuss your expectations  Complete course evaluations  Adjourn.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
EEN [Canada] Forum Shelley Borys Director, Evaluation September 30, 2010 Developing Evaluation Capacity.
Risk Management Vs Risk avoidance William Gillette.
The Process of Scope and Standards Development
Orientation to the Social Studies K to 7 Integrated Resource Package 2006.
Visual 1.1 Course Overview ICS 300 Intermediate ICS for Expanding Incidents.
Conducting the IT Audit
Complying With The Federal Information Security Act (FISMA)
Performance Management 2012 Creating and Modifying EWPS in Careers Office of Human Resources UMW: “Putting U First”
What is Business Analysis Planning & Monitoring?
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
TRAINING SOLUTIONS ISO 14001: DEVELOPMENT & IMPLEMENTATION For more information contact Victoria: (Tel) (Fax) ( )
©2009 Susan B. Harwood Grant Safety Management Systems Safety Management Worksite Analysis Management Commitment and Employee Involvement Hazard Prevention.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Copyright Course Technology 1999
Professional Certificate – Managing Public Accounts Committees Ian “Ren” Rennie.
Learning Theories, Instructional Theories, and Instructional Design Dania Bilal IS 551 Fall 2005.
© Cambridge University Press 2012 THE HUMAN RESOURCE MANAGEMENT FUNCTION AREA OF STUDY 1 UNIT 4 MANAGING PEOPLE AND CHANGE Chapter 6 MANAGEMENT OF THE.
Human Resource Development for the Central Pollution Control Board National Comprehensive Training Needs Assessment CPCB-InWEnt-GTZ/ASEM Concept for the.
Federal Information System Security Educators Association
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 Technical Communication A Reader-Centred Approach First Canadian Edition Paul V. Anderson Kerry Surman
Project Planning Author : Software Engineering Institute Carnegie Mellon University 學生 : 吳與倫 老師:李健興 教授.
BIS3324 Group Assignment – Schedule, guideline & templates (2015-Jan Semester)
Enterprise Systems Architectures EGN 5621 Enterprise Systems Collaboration (Professional MSEM) Fall, 2012.
Professional Certificate in Electoral Processes Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
Why Practical Design…Why NOW… 1 Practical Design in ODOT (Tab 2) ? Training ? 2010 Cathy Nelson, PE Technical Services Manager/ Chief Engineer.
Guidelines: Prepare at most 20 slides Headwords, no sentences A title for every slide Contents Title Overview Background Approach Summary.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
External Review Team: Roles and Responsibilities A Very Brief Training! conducted by JoLynn Noe Office of Assessment.
Fundamentals of Governance: Parliament and Government Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
MODULE 2 READNESS. OBJECTIVES Prioritize personal values and describe their relationship to incident management and firefighter safety Company Officer’s.
Key Leader Orientation 3- Key Leader Orientation 3-1.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
California Department of Public Health / 1 CALIFORNIA DEPARTMENT OF PUBLIC HEALTH Standards and Guidelines for Healthcare Surge during Emergencies How.
Evaluating Services to Binational Migrant Students InET Consortium Incentive Grant  Overview of the module  Learner outcomes  PowerPoint  Handouts.
JOB DESCRIPTIONS 1. Overview Regardless of the size or complexity of an organization, good job descriptions are vital management tools and important documents.
Part 2 Support Activities Chapter 04: Job Analysis and Rewards McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CJA 474 aid Education Begins/cja474aid.com
Document Evaluation Process May 2005 Revision
Physical Data Model – step-by-step instructions and template
CJA 474 Education for Service-- snaptutorial.com.
AMP 434Competitive Success/tutorialrank.com
AMP 434 Education for Service tutorialrank.com. AMP 434 Week 1 Discussion 1 For more course tutorials visit This course contains.
AMP 434 Education for Service-- snaptutorial.com
CJA 474 Teaching Effectively-- snaptutorial.com
AMP 434 Teaching Effectively-- snaptutorial.com
Scope management Chapter 5 Copyright ©2016 Pearson Education, Inc.
Monitoring and Evaluation using the
IS4550 Security Policies and Implementation
Student name Student ID Degree program
Job Analysis CHAPTER FOUR Screen graphics created by:
Writing Careful Long Reports
Prepared and Presented By:- Abhishek Rautela
TITLE OF YOUR PROJECT Your name and affiliation.
Presentation transcript:

FISSEA Conference 2004 Developing Role-based Learning Activities U.S. Department of State

U.S. Department of State Information Assurance Training Team Jeff Dektor Jason Geiger Susan Hansche Pat Harris

Overview Role-Based Training Requirements Role-Based Training Model IT Security Training Matrix Cell Format Example of Cell Format Training Activity Summary

Resources for Identifying Role-Based Training Requirements  NIST SP “IT Security Training Requirements: A Role- and Performance-Based Model”  Agency-specific IT security regulations and procedures Contains the IT Security Training Matrix

Functional Specialties: Generic organizational roles Training Areas: Fundamental training content categories Manage Acquire Design & Develop Implement & Operate Review & Evaluate Use Laws & Regulations Security Program System Life Cycle Security Role-Based Training Model

IT Security Training Matrix D IMPLEMENT & OPERATE C DESIGN & DEVELOP A MANAGE B ACQUIRE E REVIEW & EVALUATE F USE G OTHER 2SECURITY PROGRAM 3SYSTEM LIFE CYCLE SECURITY 1LAWS & REGULATIONS 2.1PLANNING 2.2MANAGEMENT 3.1INITIATION 3.2DEVELOPMENT 4OTHER 3.6TERMINATION 3.5OPERATIONS 3.4IMPLEMENTATION 3.3TEST & EVALUATION Functional Specialties Training Areas 1A 2.2A 2.1A 1F1E1D1C1B 3.4A3.4B 3.5A3.5C 3.6A3.6D3.6E 3.4E3.4F 3.5F3.5E3.5D 3.4C 3.5B 3.2E3.2F 3.3D3.3E3.3F 3.1B 3.2B 3.1A 3.2A 3.3C 2.1D 2.2D 3.1C 3.2C3.2D 3.1E3.1F 2.2E 2.1E2.1B 2.2B2.2C 2.1C 3.4D

Title Definition Behavioral Outcome Knowledge Levels Sample Learning Objectives Sample Job Functions IT Security Body of Knowledge Topics and Concepts Cell label Training Area Functional Specialty General learning objective Descriptive verbs for 3 training levels: Beginning; Intermediate; Advanced Specific performance objectives Relevant job titles or job functions Suggested topics Defines the training content area Cell Format

INFORMATION TECHNOLOGY SECURITY TRAINING MATRIX – Cell 2.1C Training Area: Security Program – Planning Functional Specialty: Design & Develop Definition – The design and establishment of organizational structures and processes for IT security program goal-setting, prioritizing, and related decision-making activities; these encompass such elements as organization-specific scope and content, including: policy, guidelines, needs identification, roles, responsibilities, and resource allocation. Behavioral Outcome – Individuals responsible for the design and development of an IT security program are able to create a security program plan specific to a business process or organization entity. Knowledge Levels – 1.Beginning – Locate, Understand, Apply 2.Intermediate/Advanced – Design, Develop, Decide Sample Learning Objectives – At the conclusion of this module, individuals will be able to: 1.Beginning – Understand the various components of an effective IT security program and relate them to the organization’s business process requirements. 2.Intermediate/Advanced – Design, develop, or modify IT security program requirements. Sample Job Functions – Chief Information Officer (CIO) Information Resource Manager IT Security Officer/Manager Example of Cell Contents Front Page

Activity: Develop a training solution for the assigned training requirement. Identify and describe: Learning objective Presentation mode(s) Individual or group learning/practice activity Learning measurement strategy

Summary 1.FISMA mandates IT security training. 2.NIST SP provides generic guidelines for developing role-based training. 3.Identify the functional specialty (role) and training area (content) for which the individual must be trained. 4.Use the IT Security Training Matrix to identify generic performance requirements. 5.Modify performance requirements to reflect your organization’s regulations, policies, and procedures.