<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Cyber Workforce Development</title><link href="http://www.sei.cmu.edu/feeds/topic/cyber-workforce-development/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/cyber-workforce-development/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/cyber-workforce-development/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2026-03-10T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Workforce Development</subtitle><entry><title>Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve</title><link href="https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-03-10T00:00:00-04:00</published><updated>2026-03-10T00:00:00-04:00</updated><author><name>Marie Baker</name></author><id>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity reserve.</summary></entry><entry><title>Upskilling the Federal Cybersecurity Workforce</title><link href="https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-20T00:00:00-05:00</published><updated>2026-01-20T00:00:00-05:00</updated><author><name>Christopher Herr</name></author><id>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the federal cybersecurity workforce.</summary></entry><entry><title>6 Lessons Learned from Hosting the President's Cup Cybersecurity Competition</title><link href="https://www.sei.cmu.edu/blog/6-lessons-learned-from-hosting-the-presidents-cup-cybersecurity-competition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-01-27T00:00:00-05:00</published><updated>2025-01-27T00:00:00-05:00</updated><author><name>John DiRicco</name></author><id>https://www.sei.cmu.edu/blog/6-lessons-learned-from-hosting-the-presidents-cup-cybersecurity-competition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">During its six years supporting the President's Cup, the SEI has fielded nearly 4,000 help-desk tickets.</summary></entry><entry><title>Designing Great Challenges for Cybersecurity Competitions</title><link href="https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-04-17T00:00:00-04:00</published><updated>2023-04-17T00:00:00-04:00</updated><author><name>Jarrett Booz, Josh Hammerstein, Matt Kaar</name></author><id>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post highlights the SEI’s experience developing cybersecurity challenges for the President’s Cup Cybersecurity Competition and general-purpose guidelines and best practices for developing effective challenges.</summary><category term="Cybersecurity"/><category term="Cyber Workforce Development"/></entry><entry><title>Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations</title><link href="https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-04-11T00:00:00-04:00</published><updated>2022-04-11T00:00:00-04:00</updated><author><name>Dustin Updyke, Thomas Podnar, Geoffrey Dobson, John Yarger</name></author><id>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Use of machine-learning (ML) modeling and a suite of software tools to create decision-making preferences that make non-player characters (NPCs) more realistic in simulations.</summary><category term="Cybersecurity"/><category term="Cyber Workforce Development"/></entry><entry><title>Generating Realistic Non-Player Characters for Training Cyberteams</title><link href="https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-04-12T00:00:00-04:00</published><updated>2021-04-12T00:00:00-04:00</updated><author><name>Dustin Updyke, Tyler Brooks</name></author><id>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post describes efforts underway to improve the realism of non-player characters (NPCs) in training exercises with new software called ANIMATOR.</summary><category term="Cybersecurity"/><category term="Cyber Workforce Development"/></entry><entry><title>Six Free Tools for Creating a Cyber Simulator</title><link href="https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-04-15T00:00:00-04:00</published><updated>2019-04-15T00:00:00-04:00</updated><author><name>Joseph Mayes</name></author><id>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect to the Internet....</summary><category term="Cybersecurity"/><category term="Cyber Missions"/><category term="Best Practices in Network Security"/></entry><entry><title>Structuring the Chief Information Security Officer (CISO) Organization</title><link href="https://www.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2016-02-22T00:00:00-05:00</published><updated>2016-02-22T00:00:00-05:00</updated><author><name>Nader Mehravari, Julia Allen</name></author><id>https://www.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Most organizations, no matter the size or operational environment (government or industry), employ a senior leader responsible for information security and cybersecurity....</summary><category term="Information Resilience"/></entry></feed>