OV-EXL-001 Executive Cyber Leadership
Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.
Supervises, manages, and/or leads work and workers performing cyber and cyber-related and/or cyber operations work.
Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.
Knowledges 14
Code | Description | Work Roles |
---|---|---|
K0001 | Knowledge of computer networking concepts and protocols, and network security methodologies. | 52 |
K0002 | Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). | 52 |
K0003 | Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. | 52 |
K0004 | Knowledge of cybersecurity and privacy principles. | 52 |
K0005 | Knowledge of cyber threats and vulnerabilities. | 52 |
K0006 | Knowledge of specific operational impacts of cybersecurity lapses. | 52 |
K0009 | Knowledge of application vulnerabilities. | 6 |
K0070 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). | 13 |
K0106 | Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. | 6 |
K0314 | Knowledge of industry technologies’ potential cybersecurity vulnerabilities. | 2 |
K0296 | Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. | 2 |
K0147 | Knowledge of emerging security issues, risks, and vulnerabilities. | 4 |
K0624 | Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) | 13 |
K0628 | Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations. | 3 |
Skills 5
Code | Description | Work Roles |
---|---|---|
S0018 | Skill in creating policies that reflect system security objectives. | 3 |
S0356 | Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). | 4 |
S0357 | Skill to anticipate new security threats. | 1 |
S0358 | Skill to remain aware of evolving technical infrastructures. | 2 |
S0359 | Skill to use critical thinking to analyze organizational patterns and relationships. | 1 |
Abilities 12
Code | Description | Work Roles |
---|---|---|
A0033 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. | 5 |
A0070 | Ability to apply critical reading/thinking skills. | 9 |
A0085 | Ability to exercise judgment when policies are not well-defined. | 9 |
A0094 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. | 6 |
A0105 | Ability to tailor technical and planning information to a customer’s level of understanding. | 7 |
A0106 | Ability to think critically. | 9 |
A0116 | Ability to prioritize and allocate cybersecurity resources correctly and efficiently. | 2 |
A0117 | Ability to relate strategy, business, and technology in the context of organizational dynamics. | 3 |
A0118 | Ability to understand technology, management, and leadership issues related to organization processes and problem solving. | 5 |
A0119 | Ability to understand the basic concepts and issues related to cyber and its organizational impact. | 7 |
A0129 | Ability to ensure information security management processes are integrated with strategic and operational planning processes. | 1 |
A0130 | Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control. | 1 |
Tasks 29
Code | Description | Work Roles |
---|---|---|
T0263 | Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle. | 2 |
T0264 | Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. | 3 |
T0282 | Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate. | 2 |
T0337 | Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel. | 3 |
T0356 | Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets. | 2 |
T0429 | Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. | 3 |
T0445 | Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. | 3 |
T0509 | Perform an information security risk assessment. | 2 |
T0001 | Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. | 3 |
T0002 | Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. | 2 |
T0004 | Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements. | 5 |
T0006 | Advocate organization's official position in legal and legislative proceedings. | 2 |
T0025 | Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. | 4 |
T0066 | Develop and maintain strategic plans. | 3 |
T0130 | Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. | 2 |
T0134 | Lead and align information technology (IT) security priorities with the security strategy. | 2 |
T0135 | Lead and oversee information security budget, staffing, and contracting. | 2 |
T0148 | Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. | 2 |
T0151 | Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection. | 2 |
T0227 | Recommend policy and coordinate review and approval. | 2 |
T0229 | Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. | 4 |
T0229 | Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. | 4 |
T0248 | Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. | 3 |
T0254 | Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. | 2 |
T0763 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. | 4 |
T0871 | Collaborate on cyber privacy and security policies and procedures | 2 |
T0872 | Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation | 2 |
T0927 | Appoint and guide a team of IT security experts. | 1 |
T0928 | Collaborate with key stakeholders to establish a cybersecurity risk management program. | 1 |