TY - JOUR AU - Keith S. Jones AU - Akbar Siami Namin AU - Miriam E. Armstrong AB - To identify the KSAs needed for performing cybersecurity jobs, we administered survey interviews to 44 cyber professionals at the premier hacker conferences Black Hat 2016 and DEF CON 24. Questions concerned 32 KSAs related to cyber defense. BT - Association for Computing Machinery (ACM) DA - 2018-08-09 DO - 10.1145/3152893 N1 - All 32 KSAs from the NICE framework that were included in the interview were rated as being of above neutral importance (above 3.5 on a 6-point scale).The results from the t-tests and from the open-ended questions indicate that KSAs related to networks, vulnerabilities, programming, and communication are the most important for cybersecurity students to know upon graduation. We found that most KSAs were learned primarily on the job or through self-study N2 - To identify the KSAs needed for performing cybersecurity jobs, we administered survey interviews to 44 cyber professionals at the premier hacker conferences Black Hat 2016 and DEF CON 24. Questions concerned 32 KSAs related to cyber defense. PY - 2018 T2 - Association for Computing Machinery (ACM) TI - The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals UR - https://dl.acm.org/doi/abs/10.1145/3152893 SN - 1946-6226 ER -