<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 113–246—DEC. 18, 2014?>


<?I97 128 STAT. ?>
<?I98 128 STAT. ?>
<?I99 128 STAT. ?>
<?I50 PUBLIC LAW 113–246—DEC. 18, 2014?>
<?I51 PUBLIC LAW 113–246—DEC. 18, 2014?>
<?I52 PUBLIC LAW 113–246—DEC. 18, 2014?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 113–246: To require the Secretary of Homeland Security to assess the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive workforce strategy, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>246</docNumber>
<citableAs>Public Law 113–246</citableAs><citableAs>128 Stat. 2880</citableAs>
<approvedDate>2014-12-18</approvedDate>
<dc:date>2014-12-18</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>113</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?2879</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 113–246—DEC. 18, 2014</centerRunningHead>
<coverTitle>CYBERSECURITY WORKFORCE ASSESSMENT ACT</coverTitle>
</note>
<page identifier="/us/stat/128/2880">128 STAT. 2880</page>
<dc:type>Public Law</dc:type><docNumber>113–246</docNumber>
<congress value="113">113th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Secretary of Homeland Security to assess the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive workforce strategy, and for other purposes.<sidenote><p class="centered fontsize8" id="xb1216c67-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2014-12-18">Dec. 18, 2014</approvedDate></p><p class="centered fontsize8" id="xb1216c68-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/113/hr/2952">H.R. 2952</ref>]<?GPOvSpace 12?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb1216c69-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Cybersecurity Workforce Assessment Act.</p></sidenote>
<section id="d287746e98" identifier="/us/pl/113/246/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb1216c6a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s101">6 USC 101 note</ref>.</p></sidenote><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Cybersecurity Workforce Assessment Act</shortTitle>”.</content></section>
<section id="d287746e113" identifier="/us/pl/113/246/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb1216c6b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s146">6 USC 146 note</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xb121ba8c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  In this Act—</chapeau><paragraph class="fontsize10" id="yb121ba8d-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s2/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the term “<term>Cybersecurity Category</term>” means a position’s or incumbent’s primary work function involving cybersecurity, which is further defined by Specialty Area;</content></paragraph>
<paragraph class="fontsize10" id="yb121ba8e-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s2/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the term “<term>Department</term>” means the Department of Homeland Security;</content></paragraph>
<paragraph class="fontsize10" id="yb121ba8f-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s2/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the term “<term>Secretary</term>” means the Secretary of Homeland Security; and</content></paragraph>
<paragraph class="fontsize10" id="yb121ba90-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s2/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the term “<term>Specialty Area</term>” means any of the common types of cybersecurity work as recognized by the National Initiative for Cybersecurity Education’s National Cybersecurity Workforce Framework report.</content></paragraph>
</section>
<section id="d287746e145" identifier="/us/pl/113/246/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>CYBERSECURITY WORKFORCE ASSESSMENT AND STRATEGY.</heading><subsection class="firstIndent0 fontsize10" id="yb1234131-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb1234132-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xb1234133-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s146">6 USC 146</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Workforce Assessment</inline>.</heading><paragraph class="fontsize10" id="yb1234134-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 180 days after the date of enactment of this Act, and annually thereafter for 3 years, the Secretary shall assess the cybersecurity workforce of the Department.</content></paragraph>
<paragraph class="fontsize10" id="yb1234135-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The assessment required under paragraph (1) shall include, at a minimum—</chapeau><subparagraph class="fontsize10" id="yb1234136-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>an assessment of the readiness and capacity of the workforce of the Department to meet its cybersecurity mission;</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234137-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>information on where cybersecurity workforce positions are located within the Department;</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234138-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>information on which cybersecurity workforce positions are—</chapeau><clause class="fontsize10" id="yb1234139-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>performed by—</chapeau><subclause class="fontsize10" id="yb123413a-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>permanent full-time equivalent employees of the Department, including, to the greatest extent practicable, demographic information about such employees;<page identifier="/us/stat/128/2881">128 STAT. 2881</page></content></subclause>
<subclause class="fontsize10" id="yb123413b-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>independent contractors; and</content></subclause>
<subclause class="fontsize10" id="yb123413c-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C/i/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>individuals employed by other Federal agencies, including the National Security Agency; or</content></subclause>
</clause>
<clause class="fontsize10" id="yb123413d-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>vacant; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yb123413e-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>information on—</chapeau><clause class="fontsize10" id="yb123413f-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>the percentage of individuals within each Cybersecurity Category and Specialty Area who received essential training to perform their jobs; and</content></clause>
<clause class="fontsize10" id="yb1234140-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/a/2/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in cases in which such essential training was not received, what challenges, if any, were encountered with respect to the provision of such essential training.</content></clause>
</subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb1234141-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Workforce Strategy</inline>.—</heading><paragraph class="fontsize10" id="yb1234142-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>The Secretary shall—</chapeau><subparagraph class="fontsize10" id="yb1234143-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>not later than 1 year after the date of enactment of this Act, develop a comprehensive workforce strategy to enhance the readiness, capacity, training, recruitment, and retention of the cybersecurity workforce of the Department; and</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234144-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>maintain and, as necessary, update the comprehensive workforce strategy developed under subparagraph (A).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yb1234145-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The comprehensive workforce strategy developed under paragraph (1) shall include a description of—</chapeau><subparagraph class="fontsize10" id="yb1234146-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a multi-phased recruitment plan, including with respect to experienced professionals, members of disadvantaged or underserved communities, the unemployed, and veterans;</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234147-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>a 5-year implementation plan;</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234148-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>a 10-year projection of the cybersecurity workforce needs of the Department;</content></subparagraph>
<subparagraph class="fontsize10" id="yb1234149-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>any obstacle impeding the hiring and development of a cybersecurity workforce in the Department; and</content></subparagraph>
<subparagraph class="fontsize10" id="yb123414a-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/b/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>any gap in the existing cybersecurity workforce of the Department and a plan to fill any such gap.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb123414b-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Updates</inline>.—</heading><chapeau>The Secretary submit to the appropriate congressional committees annual updates on—</chapeau><paragraph class="fontsize10" id="yb123414c-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the cybersecurity workforce assessment required under subsection (a); and</content></paragraph>
<paragraph class="fontsize10" id="yb123414d-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/246/s3/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the progress of the Secretary in carrying out the comprehensive workforce strategy required to be developed under subsection (b).</content></paragraph>
</subsection>
</section>
<section id="d287746e323" identifier="/us/pl/113/246/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>CYBERSECURITY FELLOWSHIP PROGRAM.</heading><content style="-uslm-lc:I658120">  <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb123685e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xb123685f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote>Not later than 120 days after the date of enactment of this Act, the Secretary shall submit to the appropriate congressional committees a report on the feasibility, cost, and benefits of establishing a Cybersecurity Fellowship Program to offer a tuition payment plan for individuals pursuing undergraduate and doctoral <page identifier="/us/stat/128/2882">128 STAT. 2882</page>
degrees who agree to work for the Department for an agreed-upon period of time.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2014-12-18">December 18, 2014</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/113/hr/2952">H.R. 2952</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/113/324">113–324</ref> (<committee>Comm. on Homeland Security</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 160 (2014):</heading>
<p class="indentUp4 firstIndent-1" id="xb1236860-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">July 28, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="xb1236861-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 10, considered and passed Senate, amended.</p><p class="indentUp4 firstIndent-1" id="xb1236862-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 11, House concurred in Senate amendments.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>