<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber Workforce Development</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Workforce Development</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/cyber-workforce-development/rss/" rel="self"/><language>en-us</language><lastBuildDate>Tue, 10 Mar 2026 00:00:00 -0400</lastBuildDate><item><title>Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve</title><link>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity reserve.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marie Baker</dc:creator><pubDate>Tue, 10 Mar 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Upskilling the Federal Cybersecurity Workforce</title><link>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the federal cybersecurity workforce.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Herr</dc:creator><pubDate>Tue, 20 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>6 Lessons Learned from Hosting the President's Cup Cybersecurity Competition</title><link>https://www.sei.cmu.edu/blog/6-lessons-learned-from-hosting-the-presidents-cup-cybersecurity-competition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>During its six years supporting the President's Cup, the SEI has fielded nearly 4,000 help-desk tickets.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">John DiRicco</dc:creator><pubDate>Mon, 27 Jan 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/6-lessons-learned-from-hosting-the-presidents-cup-cybersecurity-competition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Designing Great Challenges for Cybersecurity Competitions</title><link>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post highlights the SEI’s experience developing cybersecurity challenges for the President’s Cup Cybersecurity Competition and general-purpose guidelines and best practices for developing effective challenges.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrett Booz, Josh Hammerstein, Matt Kaar</dc:creator><pubDate>Mon, 17 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations</title><link>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Use of machine-learning (ML) modeling and a suite of software tools to create decision-making preferences that make non-player characters (NPCs) more realistic in simulations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Thomas Podnar, Geoffrey Dobson, John Yarger</dc:creator><pubDate>Mon, 11 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Generating Realistic Non-Player Characters for Training Cyberteams</title><link>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes efforts underway to improve the realism of non-player characters (NPCs) in training exercises with new software called ANIMATOR.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Tyler Brooks</dc:creator><pubDate>Mon, 12 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Six Free Tools for Creating a Cyber Simulator</title><link>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect to the Internet....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 15 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Structuring the Chief Information Security Officer (CISO) Organization</title><link>https://www.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Most organizations, no matter the size or operational environment (government or industry), employ a senior leader responsible for information security and cybersecurity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nader Mehravari, Julia Allen</dc:creator><pubDate>Mon, 22 Feb 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Information Resilience</category></item></channel></rss>