II
Calendar No. 515
116th CONGRESS
2d Session
S. 2775
[Report No. 116–254]
IN THE SENATE OF THE UNITED STATES
November 5, 2019
Mr. Wicker (for himself, Ms. Cantwell, Mr. Thune, and Ms. Rosen) introduced the following bill; which was read twice and referred to the Committee on Commerce, Science, and Transportation
August 12, 2020
Reported by Mr. Wicker, with amendments
Omit the part struck through and insert the part printed in italic
A BILL
To improve the cyber workforce of the United States, and for other purposes.
Short title
This Act may be cited as the Harvesting American Cybersecurity Knowledge through Education Act of 2019
or the HACKED Act of 2019
.
Improving National Initiative for Cybersecurity Education
Program improvements generally
Subsection (a) of section 401 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7451) is amended—
in paragraph (5), by striking ; and
and inserting a semicolon;
by redesignating paragraph (6) as paragraph (11); and
by inserting after paragraph (5) the following:
identifying cybersecurity workforce skill gaps in public and private sectors;
leading interagency efforts to facilitate coordination of Federal programs to advance cybersecurity education, training, and workforce, such as—
the Federal Cyber Scholarship for Service program of the National Science Foundation;
the National Centers of Academic Excellence in Cybersecurity program of the National Security Agency and the Department of Homeland Security;
the GenCyber Program of the National Science Foundation and the National Security Agency;
the apprenticeship program of the Department of Labor;
the Cybersecurity Education and Training Assistance Program of the Department of Homeland Security;
the Cyber Center of Excellence of the Army;
the Information Operations Command program of the Navy; and
such others as the Director considers appropriate;
promoting higher education and expertise in cybersecurity through designation by the National Security Agency and the Department of Homeland Security of institutions of higher education as National Centers of Academic Excellence in Cybersecurity if such institutions have robust degree programs that align to specific cybersecurity-related knowledge units that are aligned to the knowledge, skills, abilities, and tasks from the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800–181), or successor framework;
consideration of any specific needs of the cybersecurity workforce of critical infrastructure;
developing metrics to measure the effectiveness and effect of programs and initiatives to advance the cybersecurity workforce; and
.
Strategic plan
Subsection (c) of such section is amended—
by striking The Director
and inserting the following:
In general
The Director
; and
by adding at the end the following:
Requirement
The strategic plan developed and implemented under paragraph (1) shall include an indication of how the Director will carry out this section.
.
Cybersecurity career pathways
Identification of multiple cybersecurity career pathways
In carrying out subsection (a) of such section and not later than 540 days after the date of the enactment of this Act, the Director of the National Institute of Standards and Technology shall use a consultative process with other Federal agencies, academia, and industry to identify multiple career pathways for cybersecurity work roles that can be used in the private and public sectors.
Requirements
The Director shall ensure that the multiple cybersecurity career pathways identified under paragraph (1) indicate the knowledge, skills, and abilities, including relevant education, training, apprenticeships, certifications, and other experiences, that—
align with employers’ cybersecurity skill needs, including proficiency level requirements, for its workforce; and
prepare an individual to be successful in entering or advancing in a cybersecurity career.
Federal careers
The Director, in coordination with the Director of the Office of Personnel Management, shall ensure the cybersecurity career pathways identified under paragraph (1) identify career opportunities in the Federal Government, including noncompetitive hiring pathways, including for individuals who participate in Federal cybersecurity workforce training programs referred to in section 401(a)(7) of the Cybersecurity Enhancement Act of 2014, as added by subsection (a)(3).
Exchange program
The Director of the National Institute of Standards and Technology, in coordination with the Director of the Office of Personnel Management, shall establish a voluntary program for the exchange of employees engaged in one of the cybersecurity work roles identified in the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800–181), or successor framework, between the National Institute of Standards and Technology and private sector institutions, including a nonpublic or commercial business, a research institution, or an institution of higher education, as the Director of the National Institute of Standards and Technology considers feasible.
Proficiency To perform cybersecurity tasks
Not later than 540 days after the date of the enactment of this Act, the Director of the National Institute of Standards and Technology shall—
in carrying out subsection (a) of such section, assess the scope and sufficiency of efforts to measure a learner's capability to perform specific tasks found in the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800–181) at all proficiency levels; and
submit to Congress a report—
on the findings of the Director with respect to the assessment carried out under paragraph (1); and
with recommendations for effective methods for measuring the cybersecurity proficiency of learners.
Cybersecurity metrics
Such section is further amended by adding at the end the following:
Cybersecurity metrics
In carrying out subsection (a), the Director, in coordination with such agencies as the Director considers relevant, shall develop repeatable measures and reliable metrics for measuring and evaluating Federally funded cybersecurity workforce programs and initiatives based on the outcomes of such programs and initiatives.
.
Regional alliances and multistakeholder partnerships
Such section is further amended by adding at the end the following:
Regional alliances and multistakeholder partnerships
In general
Pursuant to section 2(b)(4) of the National Institute of Standards and Technology Act (15 U.S.C. 272(b)(4)), the Director shall establish cooperative agreements between the National Initiative for Cybersecurity Education (NICE) of the Institute and regional alliances or partnerships for cybersecurity education and workforce.
Agreements
The cooperative agreements established under paragraph (1) shall advance the goals of the National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NIST Special Publication 800–181), or successor framework, by facilitating local and regional partnerships—
to identify the workforce needs of the local economy and classify such workforce in accordance with such framework;
to identify the education, training, apprenticeship, and other opportunities available in the local economy; and
to support opportunities to meet the needs of the local economy.
Financial assistance
Financial assistance authorized
The Director may award financial assistance to a regional alliance or partnership with whom the Director enters into a cooperative agreement under paragraph (1) in order to assist the regional alliance or partnership in carrying out the term of the cooperative agreement.
Amount of assistance
The aggregate amount of financial assistance awarded under subparagraph (A) per cooperative agreement shall not exceed $200,000.
Matching requirement
The Director may not award financial assistance to a regional alliance or partnership under subparagraph (A) unless the regional alliance or partnership agrees that, with respect to the costs to be incurred by the regional alliance or partnership in carrying out the cooperative agreement for which the assistance was awarded, the regional alliance or partnership will make available (directly or through donations from public or private entities) non-Federal contributions in an amount equal to 50 percent of Federal funds provided under the award.
Application
In general
A regional alliance or partnership seeking to enter into a cooperative agreement under paragraph (1) and receive financial assistance under paragraph (3) shall submit to the Director an application therefor at such time, in such manner, and containing such information as the Director may require.
Requirements
Each application submitted under subparagraph (A) shall include the following:
A plan to establish (or identification of, if it already exists) a multistakeholder workforce partnership that includes—
at least one institution of higher education or nonprofit training organization; and
at least one local employer or owner or operator of critical infrastructure.
Participation from Federal Cyber Scholarships for Service organizations, National Centers of Academic Excellence in Cybersecurity, advanced technological education programs, elementary and secondary schools, training and certification providers, State and local governments, economic development organizations, or other community organizations is encouraged.
A description of how the workforce partnership would identify the workforce needs of the local economy.
A description of how the multistakeholder workforce partnership would leverage the programs and objectives of the National Initiative for Cybersecurity Education, such as the Cybersecurity Workforce Framework and the strategic plan of such initiative.
A description of how employers in the community will be recruited to support internships, apprenticeships, or cooperative education programs in conjunction with providers of education and training. Inclusion of programs that seek to include women, minorities, or veterans is encouraged.
A definition of the metrics that will be used to measure the success of the efforts of the regional alliance or partnership under the agreement.
Priority consideration
In awarding financial assistance under subparagraph (A)paragraph (3)(A), the Director shall give priority consideration to a regional alliance or partnership that includes an institution of higher education that is designated as a National Center of Academic Excellence in Cybersecurity or which receives an award under the Federal Cyber Scholarship for Service program located in the State or region of the regional alliance or partnership.
Audits
Each cooperative agreement for which financial assistance is awarded under paragraph (3) shall be subject to audit requirements under part 200 of title 2, Code of Federal Regulations (relating to uniform administrative requirements, cost principles, and audit requirements for Federal awards), or successor regulation.
Reports
In general
Upon completion of a cooperative agreement under paragraph (1), the regional alliance or partnership that participated in the agreement shall submit to the Director a report on the activities of the regional alliance or partnership under the agreement, which may include training and education outcomes.
Contents
Each report submitted under subparagraph (A) by a regional alliance or partnership shall include the following:
An assessment of efforts made by the regional alliance or partnership to carry out paragraph (2).
The metrics used by the regional alliance or partnership to measure the success of the efforts of the regional alliance or partnership under the cooperative agreement.
.
Transfer of section
Transfer
Such section is transferred to the end of title III of such Act and redesignated as section 303.
Repeal
Title IV of such Act is repealed.
Clerical
The table of contents in section 1(b) of such Act is amended—
by striking the items relating to title IV and section 401; and
by inserting after the item relating to section 302 the following:
Sec. 303. National cybersecurity awareness and education program.
.
Conforming amendments
Section 302(3) of the Federal Cybersecurity Workforce Assessment Act of 2015 (Public Law 114–113) is amended by striking under section 401 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7451)
and inserting under section 303 of the Cybersecurity Enhancement Act of 2014 (Public Law 113–274)
.
Section 2(c)(3) of the NIST Small Business Cybersecurity Act (Public Law 115–236) is amended by striking under section 401 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7451)
and inserting under section 303 of the Cybersecurity Enhancement Act of 2014 (Public Law 113–274)
.
Section 302(f) of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7442(f)) is amended by striking under section 401
and inserting under section 303
.
Development of standards and guidelines for improving cybersecurity workforce of Federal agencies
In general
Section 20(a) of the National Institute of Standards and Technology Act (15 U.S.C. 278g–3(a)) is amended—
in paragraph (3), by striking ; and
and inserting a semicolon;
in paragraph (4), by striking the period at the end and inserting ; and
; and
by adding at the end the following:
identify and develop standards and guidelines for improving the cybersecurity workforce for an agency as part of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800–181), or successor framework.
.
Publication of standards and guidelines on cybersecurity awareness
Not later than 3 years after the date of the enactment of this Act and pursuant to section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g–3), the Director of the National Institute of Standards and Technology shall publish standards and guidelines for improving cybersecurity awareness of employees and contractors of Federal agencies.
Modifications to Federal cyber scholarship-for-service program
Section 302 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7442) is amended—
in subsection (b)—
in paragraph (2), by striking information technology
and inserting information technology and cybersecurity
;
by amending paragraph (3) to read as follows:
prioritize the placement of scholarship recipients fulfilling the post-award employment obligation under this section to ensure that—
not less than 70 percent of such recipients are placed in an executive agency (as defined in section 105 of title 5, United States Code);
not more than 10 percent of such recipients are placed as educators in the field of cybersecurity at qualified institutions of higher education that provide scholarships under this section; and
not more than 20 percent of such recipients are placed in positions described in paragraphs (2) through (5) of subsection (d); and
; and
in paragraph (4), in the matter preceding subparagraph (A), by inserting , including by seeking to provide awards in coordination with other relevant agencies for summer cybersecurity camp or other experiences, including teacher training, in each of the 50 States,
after cybersecurity education
;
in subsection (d)—
in paragraph (4), by striking or
at the end;
in paragraph (5), by striking the period at the end and inserting ; or
; and
by adding at the end the following:
as provided by subsection (b)(3)(B), a qualified institution of higher education.
; and
in subsection (m)—
in paragraph (1), in the matter preceding subparagraph (A), by striking cyber
and inserting cybersecurity
; and
in paragraph (2), by striking cyber
and inserting cybersecurity
.
Cybersecurity in programs of the National Science Foundation
Computer science and cybersecurity education research
Section 310 of the American Innovation and Competitiveness Act (42 U.S.C. 1862s–7) is amended—
in subsection (b)—
in paragraph (1), by inserting and cybersecurity
after computer science
; and
in paragraph (2)—
in subparagraph (C), by striking ; and
and inserting a semicolon;
in subparagraph (D), by striking the period at the end and inserting ; and
; and
by adding at the end the following:
tools and models for the integration of cybersecurity and other interdisciplinary efforts into computer science education and computational thinking at secondary and postsecondary levels of education.
; and
in subsection (c), by inserting , cybersecurity,
after computing
.
Scientific and technical education
Section 3(j)(9) of the Scientific and Advanced-Technology Act of 1992 (42 U.S.C. 1862i(j)(9)) is amended by inserting and cybersecurity
after computer science
.
Low-Income scholarship program
Section 414(d) of the American Competitiveness and Workforce Improvement Act of 1998 (42 U.S.C. 1869c) is amended—
in paragraph (1), by striking or computer science
and inserting computer science, or cybersecurity
; and
in paragraph (2)(A)(iii), by inserting cybersecurity,
after computer science,
.
Scholarships and graduate fellowships
The Director of the National Science Foundation shall ensure that students pursuing master's degrees and doctoral degrees in fields relating to cybersecurity are considered as applicants for scholarships and graduate fellowships under the Graduate Research Fellowship Program under section 10 of the National Science Foundation Act of 1950 (42 U.S.C. 1869).
Presidential awards for teaching excellence
The Director of the National Science Foundation shall ensure that educators and mentors in fields relating to cybersecurity can be considered for—
Presidential Awards for Excellence in Mathematics and Science Teaching made under section 117 of the National Science Foundation Authorization Act of 1988 (42 U.S.C. 1881b); and
Presidential Awards for Excellence in STEM mentoringMentoring administered under section 307 of the American Innovation and Competitiveness Act (42 U.S.C. 1862s–6).
Cybersecurity in STEM programs of the National Aeronautics and Space Administration
In carrying out any STEM education program of the National Aeronautics and Space Administration (referred to in this section as NASA
), including a program of the Office of STEM Engagement, the Administrator of NASA shall, to the maximum extent practicable, encourage the inclusion of cybersecurity education opportunities in such program.
Cybersecurity in Department of Transportation programs
University transportation centers program
Section 5505 of title 49, United States Code, is amended—
in subsection (a)(2)(C), by inserting in the matters described in subparagraphs (A) through (G) of section 6503(c)(1)
after transportation leaders
; and
in subsection (c)(3)(E)—
by inserting , including the cybersecurity implications of technologies relating to connected vehicles, connected infrastructure, and autonomous vehicles
after autonomous vehicles
; and
by striking The Secretary
and inserting the following:
In general
A regional university transportation center receiving a grant under this paragraph shall carry out research focusing on 1 or more of the matters described in subparagraphs (A) through (G) of section 6503(c)(1).
Focused objectives
The Secretary
.
In general
A regional university transportation center receiving a grant under this paragraph shall carry out research focusing on 1 or more of the matters described in subparagraphs (A) through (G) of section 6503(c)(1).
Focused objectives
The Secretary”.
Transportation research and development 5-Year strategic plan
Section 6503(c)(1) of title 49, United States Code, is amended—
in subparagraph (E), by striking and
at the end;
in subparagraph (F), by inserting and
after the semicolon at the end; and
by adding at the end the following:
reducing transportation cybersecurity risks;
.
Coordination of Federal cybersecurity workforce
Coordination of Federal STEM programs and activities
Section 101(a) of the America COMPETES Reauthorization Act of 2010 (42 U.S.C. 6621(a)) is amended by inserting the National Institute of Standards and Technology,
after the National Aeronautics and Space Administration,
.
Subcommittees and working groups
Section 101 of the America COMPETES Reauthorization Act of 2010 (42 U.S.C. 6621) is amended—
by redesignating subsection (d) as subsection (e);
by inserting after subsection (c) the following:
Subcommittees and working groups
Subcommittees and working groups authorized
In general
The committee established under subsection (a) may establish 1 or more subcommittees or working groups to address specific issues in STEM education, as the committee considers appropriate.
Composition
A member of the committee established under subsection (a) may serve on a subcommittee or working group established under subparagraph (A).
Subcommittee on cybersecurity workforce required
In general
The committee established under subsection (a) shall establish or designate a subcommittee to coordinate cybersecurity education and workforce activities and programs of the Federal agencies.
Chairpersons
The chairpersons of the subcommittee established or designated under subsection (a) shall be—
the Director;
the Director of the National Institute of Standards and Technology; and
the head of any Federal agency, as the Director and the Director of the National Institute of Standards and Technology consider appropriate.
; and
by adding at the end the following:
STEM education defined
For purposes of this section, the term STEM education includes cybersecurity education.
.
August 12, 2020
Reported with amendments