- Legal Issues associated with cyber threats
- BYOD issues
- Program Monitoring and Control
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
||Knowledge of an organization??s threat environment.
||Knowledge of cyber threats and vulnerabilities.
||Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
||Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
||Knowledge of cyber laws and legal considerations and their effect on cyber planning.
||Knowledge of classification and control markings standards, policies and procedures.
||Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.