Consultancy for Establishment of National Cyber Security College - See Security - לימודי סייבר ואבטחת מידע
 

Consultancy for Establishment of National Cyber Security College

Consultancy for Establishment of National Cyber Security College

Oppening of a new Cyber Security Center for Education and Research

On December 2015, the Israel National Cyber Bureau (INCB) has so far published a list of five Cyber Security Professions (Practitioner, Architect, Methodologist, Forensics Expert and Penetration tester), and will soon publish more professions (Cyber Auditor, SOC Operator, Malware Analyst, Application Security Expert). In the next stage, more expertise may be published.

The college CEO, and main shareholder, Mr. Avi Weissman, was chairman of the Israeli National Forum of Information Security (IFIS), and provides consultancy services for the INCB and for the Israel National Cyber Security Authority.

See Security keeps track on the publications of NICE Cybersecurity Workforce Framework (NICE – The American National Initiative for Cybersecurity Education).

See Security has accumulated unique knowledge and expertise in the field of Cyber Education (NICE defines this as “Workforce Empowerment” through education). We offer consulting services to governments and large organizations who wish to map current market status, requirements and knowledge gaps, and provides a comprehensive work plan to meet market needs.

The consulting process includes the following steps and components:

Stage 1 –Analysis

  1. Team Establishment

See Security will establish a team of professionals (hereinafter, the team) that will take it upon itself to deliver the final product of a proposal. The team will consist of at least 2 leading professionals and 1 experienced project/team leader and team auditor.

  1. Initial Offsite Market Research

Initial activities in the project will include agreed period of an offsite research in order to assess various parameters regarding the current state of Cyber security engagement in the country.

  1. Advanced Onsite Market Research

As the project advances and more rigorous and detailed research is required, the team’s leading professional will visit the country for an onsite research. The research includes an agreed period visit (per professional) in the region to identify the current Cyber Security sector, meet with officials, local professionals etc., and validate offsite research results.

  1. Drafting Roadmap Document

See Security professionals will take all the research materials it acquired (either acquired through visits, or through online research), analyze the data and summarize it into a coherent roadmap (a work plan). Upon completion, a draft will be delivered and reviewed by customer. This part also includes a 2nd visit (this time with the project leader) to present the initial draft.

  1. Fine Tuning the Roadmap

Once the client assesses the initial draft, it might include some rejects or requests for elaborations. The team will review the commentary and input received from the client, and work towards a final draft based on the client remarks.

  1. Presenting the Final Roadmap

The project leader (as being involved in all aspects of the project) shall present the final draft to the initiator and receive and receive final confirmation for product delivery.

  1. Emphasis on Scope
  2. Identifying the public sector’s knowledge and training needs in Cyber security, in the territory
  3. Mapping the needed professional Cyber security roles
  4. Defining the required training and career tracks
  5. Defining the Cyber security training center’s (hereinafter, the Center) areas of activity
  6. Listing the services which may be delivered by the Center
  7. Planning the Center’s organizational structure, personnel, mode of incorporation, physical space requirements and a business/financial plan
  8. Planning the Center’s bootstrapping stage, including recruiting and training personnel (HR considerations), necessary equipment, budgeting, timeline and common aspect important for the establishment of the proposed center.
  9. Defining the boundaries of traditional learning in classrooms
  10. Definition of Practice Labs
  11. Locating and classifying personnel (Trainers, Lecturers, Teaching)
  12. Assessing requirements for National and International Certifications
  13. National regulation for Cyber Security Profession
  14. Assessing requirements for National Exams
  15. Defining the boundaries of online learning (webinar / collective on-line training / individual on-line training / offline remote studies)
  16. Building the institution of authority for graduates of the curricula in the form of Internet exams.
  17. Analysis of Varying Target Audiences

There are different parameters (from various point of views) that must be considered when planning establishment of a Cyber security training facility. Amongst these are the following parameters:

  1. Children (emphasizing Teenagers)
  2. Ministries, government agencies and municipal entities
  3. Various industries (as categories, see next)
  4. Private sector (business organizations / enterprises)
  5. Public sector
  6. Academic institutions (as customers of training deliveries)
  7. Academic institutions (as being the provider of training themselves)
  8. Unique sectors
  9. Analysis of Industries
  10. Government ministries (Treasury, Education, etc.)
  11. Government offices and agencies
  12. Finance (Banking, insurance etc.)
  13. Energy production (Electric, Oil, Hydro, Wind)
  14. Low-Tech industry
  15. Hi-Tech industry
  16. Healthcare
  17. Telecommunication
  18. Topics to be Researched

Amongst various aspects, following is a list of topics that may be considered when the roadmap is formulated:

  1. Human resources considerations (Administrators; Technicians; Instructors)
  2. Administrative Technological Infrastructure (LMS; Remote Learning platform)
  3. Operational Technological Infrastructure (Computer environment; Courses technological aspects)
  4. Marketing considerations

Notes

The allocated time to study the country of destination is limited. Therefore, limitations of the response will also be in accordance with the knowledge acquired by the reviewers sent on our behalf.

See Security is committed to do everything in its capabilities to provide the best professionals available, who are engaging in Cyber training and holding a complete and holistic understanding a strategic view of the Cyber Realm. After all, See Security and its managers are highly active in the world of cyber security in Israel.

See Security has ongoing working relations with niche experts for academic studies, military studies, youth studies and more.

Stage 2 – Deeper Analysis and Consulting

See Security is capable of providing second level and deeper research for market needs, as well as resulting recommendations. However, we believe that this goal can be achieved as part of the ongoing consulting process, as detailed below.

This strategic stage is not included in the pricing of this project.

Stage 3 – Ongoing Consulting

See Security is capable of providing ongoing consulting in the implementation phases of the project (as may be agreed upon at a later stage). Ongoing consulting may include (but is not limited to): Providing RFP documents for tenders, reviewing tender offers, contacting service providers, assisting the customer with contacting global cyber security certification bodies, consulting throughout the establishing of the training facility, etc.

This strategic stage is not included in the pricing of this project.