Explore Specific Projects Using the NICE Framework
Learning Objectives
After completing this unit, you’ll be able to:
- Design a proficiency-based project using the NICE Framework.
- Discuss the benefits of aligning cybersecurity training with the NICE Framework.
We’ve explored the NICE framework and the difference between proficiency and performance. Before we continue, let’s review a few concepts from the previous unit to ensure a solid foundation for moving forward.
Knowledge Check
Ready to review what you’ve learned? The following knowledge check isn’t scored—it’s just an easy way to quiz yourself. To get started, let’s review what you’ve learned by matching the cybersecurity proficiency level on the left to the job task to which it applies. When you finish matching all the items, click Submit to check your work. To start over, click Reset.
Now, it’s time to dig into some specific examples to explore how the NICE framework can be used to identify skills needed to solve business challenges.
Program Title: Enhance Skills in Secure Project Management
Scenario
In response to recent audit feedback, an organization has designated representatives from key organizational groups to assist the primary secure project team in carrying out their duties. Representatives work in the organization’s Secure Operations Center (SOC), Risk Management Division, and the Software Development Division. These new team members will play a crucial role in ensuring that cybersecurity is integrated into every aspect of all projects on their teams and that all projects comply with established cybersecurity standards and regulations.
To support this business requirement, the cybersecurity curriculum development team have used the NICE Framework to design a proficiency-based training program to speed up development of the knowledge and skills required for these new team members to become quickly proficient in their secure project management tasks.
Work Role, Tasks, Knowledge, and Skills
According to the National Initiative for Cybersecurity Education, the Secure Project Management work role is: “Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.”
Given the organization’s needs, proficiency-based projects will address the following tasks, knowledge, and skills.
Tasks | Knowledge | Skills |
---|---|---|
|
|
|
The following proficiency scale will be used to define current and desired levels of skill development.
- Awareness: You have a basic understanding of the skill and its concepts, but you need step-by-step guidance and supervision to apply it. You’re primarily observing and learning at this stage.
- Basic: You can perform the skill in straightforward situations with clear instructions, but you still require frequent feedback and support. You’re starting to develop some independence but still relying on others for guidance.
- Intermediate: You can apply the skill in a variety of situations with growing independence. You can handle some complexity, but you still need occasional guidance or support when facing new challenges.
- Advanced: You can confidently and independently apply the skill in complex and unpredictable situations. You can troubleshoot problems, make informed decisions, and even guide others with less experience.
- Expert: You have mastered the skill, easily applying it in any situation. You invent, mentor, and advance the field through your expertise and continuous learning.
Learners and Gap Analysis
For this project, there are nine learners. They differ in job roles, cybersecurity backgrounds, and levels of proficiency in key skills. The curriculum development team conducted a gap analysis to assess each and identify gaps in knowledge and skills. After identifying the gaps, the team designs projects focused on effectively and efficiently closing those gaps.
Identified Gaps
Learners are proficient in some areas of secure project management but also lack proficiency in other areas. Especially for projects where they manage multiple variables in a complex work environment.
Gap Analysis
Current Proficiency | Identified Skill Gap | Desired Work-Related Outcome |
---|---|---|
2 SOC Analysts | Skill in collecting relevant data from a variety of sources. Skill in preparing reports. |
|
2 SCAs | Skill in configuring systems for performance enhancement. Skill in translating operational requirements into security controls. |
|
3 RMF Team Members | Skill in evaluating security designs and products. |
|
2 Developers | Skill in identifying systems designed without security considerations. |
|
Addressing Proficiency Differences:
While learners are aiming to gain proficiency in various skills and at different levels, the proficiency-based project will challenge all participants by placing them in scenarios where they must apply the necessary skills in real-time. Learners progress at their own pace and are assessed on their ability to adapt to change, making it possible for those with basic awareness to achieve intermediate proficiency, and for those with intermediate proficiency to reach advanced and expert proficiency by the end of the project evaluation period.
Here are two sample labs that result from mapping the project's content and desired outcomes to the NICE Framework.
Project Lab 1: Evaluate Security Controls in a Complex Environment
Description
Learners will evaluate and select appropriate security controls for a simulated situation in the organization–implementing a new HR system. They’ll use project management tools OpenProject and GitLab to track tasks, manage timelines, and document control selection.
To assess systems and implement controls, learners will use a vulnerability scanning tool, Elasticsearch for security monitoring, and OpenVAS for asset management and compliance checks.
During the lab, instructors will inject unexpected scenarios, to include budget cuts, new compliance requirements (for example, a restriction on the use of open-source tools), and simulated security incidents, requiring participants to reevaluate control decisions and adapt to the new resource constraints and evolving regulatory requirements in real time.
Learning Objectives
- Develop proficiency in translating operational requirements into tailored security controls.
- Develop proficiency in evaluating, selecting, and implementing tailored security controls in a complex environment.
NICE Mapping
Relevant to the NICE Framework’s Oversight and Governance Work Role Category, with a focus on risk management and strategic decision-making in secure project environments. It also touches on the Protection and Defense Work Role Category by prioritizing safeguards for project integrity and asset protection.
Project Lab 2: Dynamic Data Collection and Leadership Reporting
Description
Learners collect and analyze cybersecurity performance and risk management data to inform critical leadership decisions about security investments. They'll use system logs, compliance reports, and industry threat intelligence feeds.
Using tools such as Kibana for data visualization, and Grafana for custom dashboards, learners will compile, interpret, and present findings.
During the lab, instructors will inject organizational-level changes, such as an urgent requirement from the CEO for a specific data-driven presentation to present to the Board. This will require learners to reprioritize, adjust their data sources and reporting approach to meet the needs of this high-profile requirement.
Learning Objectives
- Develop proficiency in identifying and gathering relevant security data from multiple sources.
- Develop proficiency in creating comprehensive and actionable reports tailored to leadership.
- Develop proficiency in meeting dynamic reporting requirements for unexpected events.
NICE Mapping
Aligned with the Oversight and Governance and Protection and Defense categories in the NICE Framework, focusing on data-driven decision-making and effective communication of project data and insights.
Sum It Up
In this unit we discussed the distinction between performance-based and proficiency-based projects, highlighting how each approach influences learning outcomes. We also examined how the NICE Framework plays a key role in building proficiency.
By focusing on real work tasks in simulated work environments, proficiency-based projects challenge learners to move beyond following instructions, encouraging them to apply their technical, nontechnical, and business skills in their work. Mapping the NICE Framework to proficiency-based projects helps to ensure the training will match real job duties. The labs ensure that employees learn both the technical skills, problem-solving and the adaptive decision-making skills that are critical for many workplace environments.