US Army: Military finds IT security certification difficulties
Network World - The U.S. Army is having a hard time manning its IT staff because it cannot find military personnel with the right networking and IT security qualifications.
The Department of Defense (DOD) Directive 8570.01-M is a military regulation first published in 2005 that puts forward considerable detail on the workplace and related training and certifications that military personnel -- and now contractors as well -- must have to operate DOD-related information systems for information assurance purposes. But the problem for the Army at this point is that it doesn't have enough personnel with the required training, said Lisa Lee, information assurance program manager, Program Executive Office, Enterprise Information Systems in the U.S. Army.
STUPID TECH SUPPORT TRICKS: IT calls of shame
To cope with the shortage of certified personnel, the Army is altering its guidelines so that not as many individuals working in areas it calls "an enclave boundary" -- defined as a specific set of routers and firewalls -- will have to meet the previous requirements, said Lee, who spoke on the topic on behalf of the Army at the recent FOSE Conference in Washington, D.C.
With that change, the individuals who have the higher security credentials the military wants will be granted higher network administrative privileges and those at a lower certification level will have less, and likely make less money, she noted. "I was forced to do it," she said. "We have some good people having trouble passing the tests. They're just not good test takers."
The alphabet-soup of security certifications, many of them well-known to the private sector, include specific sets of requirements oriented toward various designated security levels and network and operating environment, as listed on the Defense Information Systems Agency website www.disa.mil. The certifications include A+CE, Network+CE, SSCP, GSEC, CISA, GSE, CISSP, GSLC and several more.
The Army pays for a lot of baseline training and certification for personnel through vouchers, but the problem now is that "the vouchers run out" and the Army is on the lookout for "as much free stuff" as it can get, Lee said. Contractors are responsible for paying for their own training, she said. And for some types of certifications, Army personnel have to shell out on their own, she added.
Lee also noted that if someone is a "valued employee, they'll put you in another job" if you fail to get specified certification. She said she's seen people with IT security certifications who weren't as good in their jobs as those who weren't similarly certified.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.
Read more about wide area network in Network World's Wide Area Network section.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- EndPoint Interactive eGuide
- In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- The Business Value of Continuous Delivery
- Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery
- Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets
- Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but... All Government IT White Papers
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- All Government IT Webcasts