Cyber Workforce Retention
Research Report
Cyber Workforce Retention
William E. Parker
Copyright Date: Oct. 1, 2016
Published by: Air University Press
Pages: 69
OPEN ACCESS
https://www.jstor.org/stable/resrep13818
Table of Contents
Export Selected Citations Export to NoodleTools Export to RefWorks Export to EasyBib Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley...) Export a Text file (For BibTex)
Select / Unselect all
  1. Front Matter
    Front Matter (pp. i-ii)
  2. Table of Contents
    Table of Contents (pp. iii-iv)
  3. List of Illustrations
    List of Illustrations (pp. v-vi)
  4. About the Author
    About the Author (pp. vii-viii)
  5. Preface
    Preface (pp. ix-x)
  6. Acknowledgments
    Acknowledgments (pp. xi-xii)
  7. Abstract
    Abstract (pp. xiii-ix)
  8. Chapter 1 Rising Demand for Private-Sector Cyber Skills
    Chapter 1 Rising Demand for Private-Sector Cyber Skills (pp. 1-8)

    Experienced cyber and information security professions will be one of the fastest developing and in-demand occupational categories in the United States and around the world in the coming years. Recent, highly publicized criminal-underworld hacking incidents directed against recognizable and trusted companies in the private sector include Target Corporation, the Home Depot, J. P. Morgan, and Sony Pictures Entertainment. These occurrences have only highlighted the increased threat to our nation in cyberspace and fueled the fire in private-sector demand for those with cybersecurity expertise. Perpetrators can be single, reclusive attackers who attempt to penetrate networks from the comforts of home. They...

  9. Chapter 2 Air Force Cyber Warfare Operations (1B4X)
    Chapter 2 Air Force Cyber Warfare Operations (1B4X) (pp. 9-24)

    Cyber warfare is fought on a battlefield like no other. It is an unseen battlefield that cannot be felt or smelled, a place where the battle cannot be witnessed by thousands of warriors simultaneously or by the common man as have other battles since the beginning of time. However, the threat and effects of this new form of warfare have proven tangible, driving senior military leaders to develop both defensive and offensive capabilities within the domain. Early on, people realized that this new domain of warfare would require a different kind of warrior. Success on this battlefield would hinge not...

  10. Chapter 3 Retention
    Chapter 3 Retention (pp. 25-36)

    As the DOD and the whole of the federal government have labored to increase the cyber workforce in recent years, Congress has been keeping a close eye on the department to ensure this growth continues in a sustainable fashion. This keen focus was expressed in the FY 15 National Defense Authorization Act (NDAA), which required the secretaries of the military departments to provide a report to “assess whether the cyber mission warrants new officer and enlisted specialty designators that are distinct from communications, signal, and intelligence specialties, and whether recruiting, retention, and assignment of service members with cyber skills requires...

  11. Chapter 4 Final Analysis and Recommendations
    Chapter 4 Final Analysis and Recommendations (pp. 37-46)

    As we begin the final analysis and provide final recommendations to enhance future 1B4 growth, retention, and overall health, let’s first review the highlights of this study’s findings:

    1. Cybersecurity skilled personnel are in extremely high demand in the civilian labor market. The market has been in short supply for quite some time and is expected to remain so for at least the next 5–10 years. One study, however, is predicting that labor market demand and supply may reach equilibrium in fewer than 10 years.

    2. Cyber Airmen, in particular 1B4s, have the skill sets needed in the labor market: their...

  12. Abbreviations
    Abbreviations (pp. 47-48)
  13. Bibliography
    Bibliography (pp. 49-52)
  14. Back Matter
    Back Matter (pp. 53-53)