-
1. Introduction
-
2. Overview of the relevant Competencies
-
3. Overview of the identified Work roles
-
4. Mapping of Competencies to Work Roles
-
5. Conclusion
-
6. Acknowledgments and funding
Mapping Competencies to Cybersecurity Work Roles
Tschechien, USA
Sicherheit und Recht
Tagungsband IRIS 2022
Zitiervorschlag: Anna Blechová / Jakub Drmola / Jan Hajný / František Kasl / Pavel Loutocký / Miroslav Mareš / Tomáš Pitner / Jakub Vostoupal, Mapping Competencies to Cybersecurity Work Roles, in: Jusletter IT 30. Juni 2022
The increase of dependence on digital services as a result of the COVID-19 pandemic reinforced the general need to effectively address the long-term perceived cybersecurity expertise gap. One of the instruments that allow better coordination and optimisation of efforts towards expedient and meaningful cybersecurity training and innovation is an alignment of perspectives on the competency requirements associated with the sought-after cybersecurity experts. To this goal, our research team is developing a cybersecurity qualifications framework modelled on the US-focused NICE framework. In this contribution, we present our progress in mapping the expected competencies to the defined work roles.