US Army: Military finds IT security certification difficulties
Network World - The U.S. Army is having a hard time manning its IT staff because it cannot find military personnel with the right networking and IT security qualifications.
The Department of Defense (DOD) Directive 8570.01-M is a military regulation first published in 2005 that puts forward considerable detail on the workplace and related training and certifications that military personnel -- and now contractors as well -- must have to operate DOD-related information systems for information assurance purposes. But the problem for the Army at this point is that it doesn't have enough personnel with the required training, said Lisa Lee, information assurance program manager, Program Executive Office, Enterprise Information Systems in the U.S. Army.
STUPID TECH SUPPORT TRICKS: IT calls of shame
To cope with the shortage of certified personnel, the Army is altering its guidelines so that not as many individuals working in areas it calls "an enclave boundary" -- defined as a specific set of routers and firewalls -- will have to meet the previous requirements, said Lee, who spoke on the topic on behalf of the Army at the recent FOSE Conference in Washington, D.C.
With that change, the individuals who have the higher security credentials the military wants will be granted higher network administrative privileges and those at a lower certification level will have less, and likely make less money, she noted. "I was forced to do it," she said. "We have some good people having trouble passing the tests. They're just not good test takers."
The alphabet-soup of security certifications, many of them well-known to the private sector, include specific sets of requirements oriented toward various designated security levels and network and operating environment, as listed on the Defense Information Systems Agency website www.disa.mil. The certifications include A+CE, Network+CE, SSCP, GSEC, CISA, GSE, CISSP, GSLC and several more.
The Army pays for a lot of baseline training and certification for personnel through vouchers, but the problem now is that "the vouchers run out" and the Army is on the lookout for "as much free stuff" as it can get, Lee said. Contractors are responsible for paying for their own training, she said. And for some types of certifications, Army personnel have to shell out on their own, she added.
Lee also noted that if someone is a "valued employee, they'll put you in another job" if you fail to get specified certification. She said she's seen people with IT security certifications who weren't as good in their jobs as those who weren't similarly certified.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.
Read more about wide area network in Network World's Wide Area Network section.
This pilot fish works for a municipal utility, and he's responsible for an industrial-control network that manages the utility's many substations. What he's not is an IT guy.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- SIP Migration: Addressing CIOs' Concerns
- Recent data from IDG Research shows that many IT executives are counting on SIP to help them meet employee efficiency and customer experience...
- SBIC: Transforming Information Security
- This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- InfoTech: Cloud File Sharing
- Organizations are increasingly turning to cloud file sharing solutions to meet end-user's needs for a lightweight and effective collaboration tool. In this report,...
- Rethinking Backup and Recovery
- As enterprises continue to transform their data centers, and virtualization plays an increasing role in their IT infrastructures, the way data is backed... All Government IT White Papers
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate.
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap...
- Introducing Cloud-Based Disaster Recovery From VMware Cost-effectively protect your business applications in the case of a local disaster or disruptive event. VMware is excited to introduce vCloud Hybrid Service...
- All Government IT Webcasts
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.