Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: Workforce Development, 32172-32174 [2017-14553]

Download as PDF 32172 Federal Register / Vol. 82, No. 132 / Wednesday, July 12, 2017 / Notices asabaliauskas on DSKBBXCHB2PROD with NOTICES subject to this review. For any individually examined respondent whose weighted-average dumping margin is above de minimis (i.e., 0.50 percent), the Department will calculate importer- (or customer)-specific assessment rates for merchandise subject to this review. Where the respondent reported reliable entered values, the Department calculated importer- (or customer)-specific ad valorem rates by aggregating the dumping margins calculated for all U.S. sales to the importer- (or customer) and dividing this amount by the total entered value of the sales to the importer- (or customer).14 Where the Department calculated an importer- (or customer)-specific weighted-average dumping margin by dividing the total amount of dumping for reviewed sales to the importer- (or customer) by the total sales quantity associated with those transactions, the Department will direct CBP to assess importer- (or customer)-specific assessment rates based on the resulting per-unit rates.15 Where an importer- (or customer)specific ad valorem or per-unit rate is greater than de minimis, the Department will instruct CBP to collect the appropriate duties at the time of liquidation. Where either the respondent’s weighted average dumping margin is zero or de minimis, or an importer (or customer-) specific ad valorem or per-unit rate is zero or de minimis, the Department will instruct CBP to liquidate appropriate entries without regard to antidumping duties.16 For merchandise whose sale/entry was not reported in the U.S. sales database submitted by an exporter individually examined during this review, but that entered under the case number of that exporter (i.e., at the individually-examined exporter’s cash deposit rate), the Department will instruct CBP to liquidate such entries at the PRC-wide rate. Additionally, if the Department determines that an exporter under review had no shipments of the subject merchandise, any suspended entries that entered under that exporter’s case number will be liquidated at the PRC-wide rate.17 14 See 19 CFR 351.212(b)(1). 15 Id. 16 See Antidumping Proceedings: Calculation of the Weighted-Average Dumping Margin and Assessment Rate in Certain Antidumping Duty Proceedings; Final Modification, 77 FR 8101, 8103 (February 14, 2012). 17 See Non-Market Economy Antidumping Proceedings: Assessment of Antidumping Duties, 76 FR 65694 (October 24, 2011), for a full discussion of this practice. VerDate Sep<11>2014 17:54 Jul 11, 2017 Jkt 241001 Cash Deposit Requirements The following cash deposit requirements will be effective upon publication of these final results of review for shipments of the subject merchandise from the PRC entered, or withdrawn from warehouse, for consumption on or after the publication date, as provided by section 751(a)(2)(C) of the Act: (1) For the companies listed above the cash deposit rate will be their respective rate established in the final results of this review; (2) for previously investigated PRC and non-PRC exporters not listed above that have separate rates, the cash deposit rate will continue to be the exporter-specific rate published for the most recent period; (3) for all PRC exporters of subject merchandise which have not been found to be entitled to a separate rate, the cash deposit rate will be the rate for the PRC-wide entity (i.e., 165.04 percent); and (4) for all non-PRC exporters of subject merchandise which have not received their own rate, the cash deposit rate will be the rate applicable to the PRC exporter that supplied that non-PRC exporter. These deposit requirements, when imposed, shall remain in effect until further notice. Disclosure We intend to disclose the calculations performed for these final results within five days of publication of this notice in the Federal Register in accordance with 19 CFR 351.224(b). Notification to Importers Regarding the Reimbursement of Duties This notice also serves as a final reminder to importers of their responsibility under 19 CFR 351.402(f)(2) to file a certificate regarding the reimbursement of antidumping duties prior to liquidation of the relevant entries during this review period. Failure to comply with this requirement could result in the Department’s presumption that reimbursement of antidumping duties occurred and the subsequent assessment of double antidumping duties. Notification Regarding Administrative Protective Orders (APO) This notice also serves as a reminder to parties subject to APO of their responsibility concerning the return or destruction of proprietary information disclosed under APO in accordance with 19 CFR 351.305, which continues to govern business proprietary information in this segment of the proceeding. Timely written notification of the return or destruction of APO materials, or conversion to judicial protective order, is hereby requested. PO 00000 Frm 00013 Fmt 4703 Sfmt 4703 Failure to comply with the regulations and terms of an APO is a violation which is subject to sanction. This notice of the final results of this antidumping duty administrative review is issued and published in accordance with sections 751(a)(1) and 777(i) of the Act and 19 CFR 351.213 and 19 CFR 351.221(b)(5). Dated: July 5, 2017. Carole Showers, Executive Director, Office of Policy, performing the duties of the Deputy Assistant Secretary for Enforcement and Compliance. Appendix—List of Topics Discussed in the Issues and Decision Memorandum Summary Background Scope of the Order List of Abbreviations and Acronyms Discussion of the Issues Comment 1: Scope of the Order (A) The Scope of the Order Is Unlawful (B) The Final Scope Determination Does Not Apply Retroactively Comment 2: CVD Export Subsidies Comment 3: Use of Zero Import Quantity Comment 4: Use of Differential Pricing Analysis Comment 5: Surrogate Value for Aluminum Frames Comment 6: Surrogate Value for Scrap Modules Comment 7: Exclusion of Certain Sales in the Calculation of Dumping Margin Comment 8: Warranty Expenses Comment 9: Debt Restructuring Income Comment 10: Surrogate Value for Module Glass Comment 11: Selection of Financial Statements Comment 12: JA Solar Technology Co., Ltd.’s No Shipments Claim [FR Doc. 2017–14611 Filed 7–11–17; 8:45 am] BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket Number 170627596–7596–01] Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: Workforce Development National Institute of Standards and Technology (NIST), Department of Commerce. ACTION: Notice; Request for Information (RFI). AGENCY: Executive Order 13800, ‘‘Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure’’ (the ‘‘Executive Order’’), directs the Secretary of Commerce, in conjunction with the Secretary of Homeland Security, and in consultation SUMMARY: E:\FR\FM\12JYN1.SGM 12JYN1 asabaliauskas on DSKBBXCHB2PROD with NOTICES Federal Register / Vol. 82, No. 132 / Wednesday, July 12, 2017 / Notices with other Federal Departments and Agencies, to assess the scope and sufficiency of efforts to educate and train the American cybersecurity workforce of the future, including cybersecurity-related education curricula, training, and apprenticeship programs, from primary through higher education; and provide a report to the President with findings and recommendations regarding how to support the growth and sustainment of the Nation’s cybersecurity workforce in both the public and private sectors. The National Institute of Standards and Technology (NIST) is seeking information on the scope and sufficiency of efforts to educate and train the Nation’s cybersecurity workforce and recommendations for ways to support and improve that workforce in both the public and private sectors. Responses to this RFI—which will be posted at https://nist.gov/nice/ cybersecurityworkforce—will inform the assessment and report of the Secretaries of Commerce and Homeland Security to the President. DATES: Comments must be received by 5 p.m. Eastern time on August 2, 2017. ADDRESSES: Online submissions in electronic form may be sent to cybersecurityworkforce@nist.gov. Please include the subject heading of ‘‘Cybersecurity Workforce RFI’’. Attachments to electronic comments will be accepted in Microsoft Word or Excel, or Adobe PDF formats only. Written comments may be submitted by mail to Cybersecurity Workforce RFI, National Institute of Standards and Technology, 100 Bureau Drive, Stop 2000, Gaithersburg, MD 20899. Comments containing references, studies, research, and other empirical data that are not widely published should include copies or electronic links of the referenced materials. All submissions, including attachments and other supporting materials, will become part of the public record and subject to public disclosure. Sensitive personal information, such as account numbers or Social Security numbers, or names of other individuals, should not be included. Submissions will not be edited to remove any identifying or contact information. Do not submit confidential business information, or otherwise sensitive or protected information. Please do not submit additional materials. All comments received in response to this RFI will be made available at https:// nist.gov/nice/cybersecurityworkforce without change or redaction, so commenters should not include VerDate Sep<11>2014 17:54 Jul 11, 2017 Jkt 241001 information they do not wish to be posted (e.g., personal or confidential business information). Comments that contain profanity, vulgarity, threats, or other inappropriate language will not be posted or considered. FOR FURTHER INFORMATION CONTACT: For questions about this RFI, contact: Danielle Santos at 301–975–5048 or Danielle.Santos@nist.gov. Please direct media inquiries to the NIST Public Affairs Office at 301–975–2762 or Jennifer.huergo@nist.gov. SUPPLEMENTARY INFORMATION: Executive Order 13800 of May 11, 2017, ‘‘Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,’’ directs the Secretary of Commerce and the Secretary of Homeland Security to consult with the Secretaries of Defense, Labor, and Education, the Director of the Office of Management and Budget, and other agencies identified jointly by the Secretary of Commerce and the Secretary of Homeland Security, in conducting an assessment and making recommendations regarding the nation’s cybersecurity workforce.1 Specifically, these departments are to: (A) ‘‘jointly assess the scope and sufficiency of efforts to educate and train the American cybersecurity workforce of the future, including cybersecurity-related education curricula, training, and apprenticeship programs, from primary through higher education; and’’ (B) ‘‘within 120 days of this order, provide a report to the President through the Assistant to the President for Homeland Security and Counterterrorism, with findings and recommendations regarding how to support the growth and sustainment of the Nation’s cybersecurity workforce in both the public and private sectors.’’ 2 The Commerce Department’s National Institute of Standards and Technology is soliciting comments from the public that will aid the Department of Commerce (DOC) and the Department of Homeland Security (DHS) in preparing the assessment and report to the President. For the purposes of this RFI, ‘‘education and training’’ of the American cybersecurity workforce does not include general workforce cybersecurity awareness efforts. Rather, ‘‘education and training’’ refers to curriculum- or practicum-based programs to increase the effectiveness of the workforce addressing cybersecurity challenges. As the Executive Order 1 Exec. Order No. 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, 82 FR 22391 (May 16, 2017). 2 https://www.federalregister.gov/d/2017-10004. PO 00000 Frm 00014 Fmt 4703 Sfmt 4703 32173 states, comments are sought on the cybersecurity workforce in both the private and public sectors. NIST may conduct workshops to gain further public input to the assessment and recommendations regarding the cybersecurity workforce. Information will be made available at https:// nist.gov/nice/cybersecurityworkforce. This RFI does not address additional aspects of the cybersecurity workforce that are included in the Executive Order. Request for Information Given the nature and importance of the Executive Order, NIST requests information from the public about current, planned, or recommended education and training programs aimed at strengthening the U.S. cybersecurity workforce. Respondents are encouraged—but are not required—to respond to each question and to present their answers after each question. The following questions cover the major areas about which NIST seeks comment. They are not intended to limit the topics that may be addressed. Respondents may address related topics and may organize their submissions in response to this RFI in any manner. Responses may include estimates; please indicate where the response is an estimate. All responses that comply with the requirements listed in the DATES and ADDRESSES sections of this RFI will be considered. Comments containing references, studies, research, and other empirical data that are not widely published should include copies or electronic links of the referenced materials. Do not include in comments or otherwise submit proprietary or confidential information, as all comments received in response to this RFI will be made available publicly at https://nist.gov/ nice/cybersecurityworkforce. Comments that contain profanity, vulgarity, threats, or other inappropriate language will not be posted or considered. General Information 1. Are you involved in cybersecurity workforce education or training (e.g., curriculum-based programs)? If so, in what capacity (including, but not limited to: Community college or university faculty or administrator; official with a non-profit association focused on cybersecurity workforce needs; manufacturer or service company that relies on cybersecurity employees; cybersecurity curriculum developer; cybersecurity training institute; educator in a primary grade school; government agency that provides E:\FR\FM\12JYN1.SGM 12JYN1 32174 Federal Register / Vol. 82, No. 132 / Wednesday, July 12, 2017 / Notices asabaliauskas on DSKBBXCHB2PROD with NOTICES funding for cybersecurity education; or student or employee enrolled in a cybersecurity education or training program)? Note: Providing detailed information, including your specific affiliation is optional and will be made publicly available. Commenters should not include information they do not wish to be posted (e.g., personal or confidential business information) and are strongly encouraged not to include Personally Identifiable Information in their submissions. Growing and Sustaining the Nation’s Cybersecurity Workforce 1. What current metrics and data exist for cybersecurity education, training, and workforce developments, and what improvements are needed in the collection, organization, and sharing of information about cybersecurity education, training, and workforce development programs? 2. Is there sufficient understanding and agreement about workforce categories, specialty areas, work roles, and knowledge/skills/abilities? 3. Are appropriate cybersecurity policies in place in your organization regarding workforce education and training efforts and are those policies regularly and consistently enforced? 4. What types of knowledge or skills do employers need or value as they build their cybersecurity workforce? Are employer expectations realistic? Why or why not? Are these expectations in line with the knowledge and skills of the existing workforce or student pipeline? How do these types of knowledge and skills vary by role, industry, and sector, (e.g., energy vs financial sectors)? 5. Which are the most effective cybersecurity education, training, and workforce development programs being conducted in the United States today? What makes those programs effective? What are the goals for these programs and how are they successful in reaching their goals? Are there examples of effective/scalable cybersecurity, education, training, and workforce development programs? 6. What are the greatest challenges and opportunities facing the Nation, employers, and workers in terms of cybersecurity education, training, and workforce development? 7. How will advances in technology (e.g., artificial intelligence, Internet of Things, etc.) or other factors affect the cybersecurity workforce needed in the future? How much do cybersecurity education, training, and workforce development programs need to adapt to prepare the workforce to protect modernized cyber physical systems (CPS)? VerDate Sep<11>2014 17:54 Jul 11, 2017 Jkt 241001 8. What steps or programs should be continued, modified, discontinued, or introduced to grow and sustain the Nation’s cybersecurity workforce, taking into account needs and trends? What steps should be taken: i. At the Federal level? ii. At the state or local level, including school systems? iii. By the private sector, including employers? iv. By education and training providers? v. By technology providers? Kevin Kimball, NIST Chief of Staff. [FR Doc. 2017–14553 Filed 7–11–17; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration Proposed Information Collection; Comment Request; West Coast Region Vessel Identification Requirements National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice. AGENCY: The Department of Commerce, as part of its continuing effort to reduce paperwork and respondent burden, invites the general public and other Federal agencies to comment on proposed and/or continuing information collections, as required by the Paperwork Reduction Act of 1995. DATES: Written comments must be submitted on or before September 11, 2017. SUMMARY: Direct all written comments to Jennifer Jessup, Departmental Paperwork Clearance Officer, Department of Commerce, Room 6616, 14th and Constitution Avenue NW., Washington, DC 20230 (or via the Internet at pracomments@doc.gov). FOR FURTHER INFORMATION CONTACT: Requests for additional information or copies of the information collection instrument and instructions should be directed to Shannon Penna, National Marine Fisheries Service (NMFS), West Coast Region (WCR) Long Beach Office, 501 West Ocean Blvd., Suite 4200, Long Beach, CA 90802, (562) 980–4238 or shannon.penna@noaa.gov. SUPPLEMENTARY INFORMATION: ADDRESSES: I. Abstract This request is for extension of a current information collection. PO 00000 Frm 00015 Fmt 4703 Sfmt 4703 Regulations at 50 CFR 660.704 require that all commercial fishing vessels with permits issued under authority of the National Marine Fishery Service’s (NMFS) Fishery Management Plan for United States (U.S.) West Coast Highly Migratory Species Fisheries display the vessel’s official number (U.S. Coast Guard documentation number or state registration number). The numbers must be of a specific size and format and located at specified locations. The official number must be affixed to each vessel subject to this section in block Arabic numerals at least 10 inches (25.40 centimeters) in height for vessels more than 25 feet (7.62 meters) but equal to or less than 65 feet (19.81 meters) in length; and 18 inches (45.72 centimeters) in height for vessels longer than 65 feet (19.81 meters) in length. Markings must be legible and of a color that contrasts with the background. The display of the identifying number aids in fishery law enforcement. This requirement does not apply to recreational charter vessels. II. Method of Collection The vessels’ official numbers are displayed on the vessels. III. Data OMB Control Number: 0648–0361. Form Number(s): None. Type of Review: Regular submission (extension of a current information collection). Affected Public: Business or other forprofit organizations. Estimated Number of Respondents: 1700. Estimated Time per Response: All but purse seine vessels, 45 minutes; purse seine vessels, 1 hour, 15 minutes. Estimated Total Annual Burden Hours: 1,325 hours. Estimated Total Annual Cost to Public: $13,250. IV. Request for Comments Comments are invited on: (a) Whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information shall have practical utility; (b) the accuracy of the agency’s estimate of the burden (including hours and cost) of the proposed collection of information; (c) ways to enhance the quality, utility, and clarity of the information to be collected; and (d) ways to minimize the burden of the collection of information on respondents, including through the use of automated collection techniques or other forms of information technology. E:\FR\FM\12JYN1.SGM 12JYN1

Agencies

[Federal Register Volume 82, Number 132 (Wednesday, July 12, 2017)]
[Notices]
[Pages 32172-32174]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2017-14553]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket Number 170627596-7596-01]


Strengthening the Cybersecurity of Federal Networks and Critical 
Infrastructure: Workforce Development

AGENCY: National Institute of Standards and Technology (NIST), 
Department of Commerce.

ACTION: Notice; Request for Information (RFI).

-----------------------------------------------------------------------

SUMMARY: Executive Order 13800, ``Strengthening the Cybersecurity of 
Federal Networks and Critical Infrastructure'' (the ``Executive 
Order''), directs the Secretary of Commerce, in conjunction with the 
Secretary of Homeland Security, and in consultation

[[Page 32173]]

with other Federal Departments and Agencies, to assess the scope and 
sufficiency of efforts to educate and train the American cybersecurity 
workforce of the future, including cybersecurity-related education 
curricula, training, and apprenticeship programs, from primary through 
higher education; and provide a report to the President with findings 
and recommendations regarding how to support the growth and sustainment 
of the Nation's cybersecurity workforce in both the public and private 
sectors. The National Institute of Standards and Technology (NIST) is 
seeking information on the scope and sufficiency of efforts to educate 
and train the Nation's cybersecurity workforce and recommendations for 
ways to support and improve that workforce in both the public and 
private sectors.
    Responses to this RFI--which will be posted at https://nist.gov/nice/cybersecurityworkforce--will inform the assessment and report of 
the Secretaries of Commerce and Homeland Security to the President.

DATES: Comments must be received by 5 p.m. Eastern time on August 2, 
2017.

ADDRESSES: Online submissions in electronic form may be sent to 
cybersecurityworkforce@nist.gov. Please include the subject heading of 
``Cybersecurity Workforce RFI''. Attachments to electronic comments 
will be accepted in Microsoft Word or Excel, or Adobe PDF formats only. 
Written comments may be submitted by mail to Cybersecurity Workforce 
RFI, National Institute of Standards and Technology, 100 Bureau Drive, 
Stop 2000, Gaithersburg, MD 20899. Comments containing references, 
studies, research, and other empirical data that are not widely 
published should include copies or electronic links of the referenced 
materials.
    All submissions, including attachments and other supporting 
materials, will become part of the public record and subject to public 
disclosure. Sensitive personal information, such as account numbers or 
Social Security numbers, or names of other individuals, should not be 
included. Submissions will not be edited to remove any identifying or 
contact information. Do not submit confidential business information, 
or otherwise sensitive or protected information. Please do not submit 
additional materials. All comments received in response to this RFI 
will be made available at https://nist.gov/nice/cybersecurityworkforce 
without change or redaction, so commenters should not include 
information they do not wish to be posted (e.g., personal or 
confidential business information). Comments that contain profanity, 
vulgarity, threats, or other inappropriate language will not be posted 
or considered.

FOR FURTHER INFORMATION CONTACT: For questions about this RFI, contact: 
Danielle Santos at 301-975-5048 or Danielle.Santos@nist.gov. Please 
direct media inquiries to the NIST Public Affairs Office at 301-975-
2762 or Jennifer.huergo@nist.gov.

SUPPLEMENTARY INFORMATION: Executive Order 13800 of May 11, 2017, 
``Strengthening the Cybersecurity of Federal Networks and Critical 
Infrastructure,'' directs the Secretary of Commerce and the Secretary 
of Homeland Security to consult with the Secretaries of Defense, Labor, 
and Education, the Director of the Office of Management and Budget, and 
other agencies identified jointly by the Secretary of Commerce and the 
Secretary of Homeland Security, in conducting an assessment and making 
recommendations regarding the nation's cybersecurity workforce.\1\ 
Specifically, these departments are to:
---------------------------------------------------------------------------

    \1\ Exec. Order No. 13800, Strengthening the Cybersecurity of 
Federal Networks and Critical Infrastructure, 82 FR 22391 (May 16, 
2017).
---------------------------------------------------------------------------

    (A) ``jointly assess the scope and sufficiency of efforts to 
educate and train the American cybersecurity workforce of the future, 
including cybersecurity-related education curricula, training, and 
apprenticeship programs, from primary through higher education; and''
    (B) ``within 120 days of this order, provide a report to the 
President through the Assistant to the President for Homeland Security 
and Counterterrorism, with findings and recommendations regarding how 
to support the growth and sustainment of the Nation's cybersecurity 
workforce in both the public and private sectors.'' \2\
---------------------------------------------------------------------------

    \2\ https://www.federalregister.gov/d/2017-10004.
---------------------------------------------------------------------------

    The Commerce Department's National Institute of Standards and 
Technology is soliciting comments from the public that will aid the 
Department of Commerce (DOC) and the Department of Homeland Security 
(DHS) in preparing the assessment and report to the President. For the 
purposes of this RFI, ``education and training'' of the American 
cybersecurity workforce does not include general workforce 
cybersecurity awareness efforts. Rather, ``education and training'' 
refers to curriculum- or practicum-based programs to increase the 
effectiveness of the workforce addressing cybersecurity challenges. As 
the Executive Order states, comments are sought on the cybersecurity 
workforce in both the private and public sectors.
    NIST may conduct workshops to gain further public input to the 
assessment and recommendations regarding the cybersecurity workforce. 
Information will be made available at https://nist.gov/nice/cybersecurityworkforce.
    This RFI does not address additional aspects of the cybersecurity 
workforce that are included in the Executive Order.

Request for Information

    Given the nature and importance of the Executive Order, NIST 
requests information from the public about current, planned, or 
recommended education and training programs aimed at strengthening the 
U.S. cybersecurity workforce.
    Respondents are encouraged--but are not required--to respond to 
each question and to present their answers after each question. The 
following questions cover the major areas about which NIST seeks 
comment. They are not intended to limit the topics that may be 
addressed. Respondents may address related topics and may organize 
their submissions in response to this RFI in any manner. Responses may 
include estimates; please indicate where the response is an estimate.
    All responses that comply with the requirements listed in the DATES 
and ADDRESSES sections of this RFI will be considered.
    Comments containing references, studies, research, and other 
empirical data that are not widely published should include copies or 
electronic links of the referenced materials. Do not include in 
comments or otherwise submit proprietary or confidential information, 
as all comments received in response to this RFI will be made available 
publicly at https://nist.gov/nice/cybersecurityworkforce. Comments that 
contain profanity, vulgarity, threats, or other inappropriate language 
will not be posted or considered.

General Information

    1. Are you involved in cybersecurity workforce education or 
training (e.g., curriculum-based programs)? If so, in what capacity 
(including, but not limited to: Community college or university faculty 
or administrator; official with a non-profit association focused on 
cybersecurity workforce needs; manufacturer or service company that 
relies on cybersecurity employees; cybersecurity curriculum developer; 
cybersecurity training institute; educator in a primary grade school; 
government agency that provides

[[Page 32174]]

funding for cybersecurity education; or student or employee enrolled in 
a cybersecurity education or training program)? Note: Providing 
detailed information, including your specific affiliation is optional 
and will be made publicly available. Commenters should not include 
information they do not wish to be posted (e.g., personal or 
confidential business information) and are strongly encouraged not to 
include Personally Identifiable Information in their submissions.

Growing and Sustaining the Nation's Cybersecurity Workforce

    1. What current metrics and data exist for cybersecurity education, 
training, and workforce developments, and what improvements are needed 
in the collection, organization, and sharing of information about 
cybersecurity education, training, and workforce development programs?
    2. Is there sufficient understanding and agreement about workforce 
categories, specialty areas, work roles, and knowledge/skills/
abilities?
    3. Are appropriate cybersecurity policies in place in your 
organization regarding workforce education and training efforts and are 
those policies regularly and consistently enforced?
    4. What types of knowledge or skills do employers need or value as 
they build their cybersecurity workforce? Are employer expectations 
realistic? Why or why not? Are these expectations in line with the 
knowledge and skills of the existing workforce or student pipeline? How 
do these types of knowledge and skills vary by role, industry, and 
sector, (e.g., energy vs financial sectors)?
    5. Which are the most effective cybersecurity education, training, 
and workforce development programs being conducted in the United States 
today? What makes those programs effective? What are the goals for 
these programs and how are they successful in reaching their goals? Are 
there examples of effective/scalable cybersecurity, education, 
training, and workforce development programs?
    6. What are the greatest challenges and opportunities facing the 
Nation, employers, and workers in terms of cybersecurity education, 
training, and workforce development?
    7. How will advances in technology (e.g., artificial intelligence, 
Internet of Things, etc.) or other factors affect the cybersecurity 
workforce needed in the future? How much do cybersecurity education, 
training, and workforce development programs need to adapt to prepare 
the workforce to protect modernized cyber physical systems (CPS)?
    8. What steps or programs should be continued, modified, 
discontinued, or introduced to grow and sustain the Nation's 
cybersecurity workforce, taking into account needs and trends? What 
steps should be taken:
    i. At the Federal level?
    ii. At the state or local level, including school systems?
    iii. By the private sector, including employers?
    iv. By education and training providers?
    v. By technology providers?

Kevin Kimball,
NIST Chief of Staff.
[FR Doc. 2017-14553 Filed 7-11-17; 8:45 am]
BILLING CODE 3510-13-P