Haystack Solutions’ Cyber Aptitude and Talent Assessment (CATA) Reveals Latent Cyber Genius Potential

By Jeff Steuart

Haystack Solutions’ new Cyber Aptitude and Talent Assessment (CATA) has been shown in tests conducted at the University of Maryland’s (UMD) Applied Research Laboratory for Intelligence and Security (ARLIS) Center to provide cybersecurity aptitude assessments that predict candidate success with uncanny precision.

The findings have far-reaching implications for organizations seeking to discover, onboard and promote top candidates in the current cybersecurity talent squeeze. CATA assessments promise to offer insight into the problem solving, visualization, and pattern recognition capabilities of cybersecurity candidates – qualities that certifications and degrees don’t necessarily reflect.

The assessment can aid commercial sector companies in both streamlining the identification and hiring of top candidates, and optimizing the ROI of limited training budgets.

In performance-under-pressure testing of hundreds of DoD participants from SOCOM, U.S. Navy, West Point, and USAF at UMD, CATA identified aptitudes in key areas associated with cybersecurity excellence such as critical thinking, exhaustiveness of approach and practices, initiating behaviors, real-time effectiveness, and responding behaviors.

CATA focuses on five key cerebral dimensions: critical thinking, deliberate action, real-time action, proactive thinking, and reactive thinking. It includes a series of tests designed to measure cognitive abilities and map a candidate’s natural aptitudes within four domains of commercial sector cybersecurity careers: red teams, blue teams, analytics and forensics, and solutions development. The approach effectively opens the ‘black box’ of the cognitive capabilities that separate optimal candidates, measuring aptitudes that aren’t automatically reflected in professional certifications.

CATA testing is shown to enable assessment of candidates regardless of their native language, English-speaking proficiency, or prior experience with IT and cybersecurity principles.

UMD ARLIS Test Results
Michael Bunting, Ph.D., the Director of Cognitive Security and Information Operations at UMD’s ARLIS center, Haystack’s CTO, and technology co-inventor, said: “CATA’s core has been used by the U.S. Intelligence Community and Department of Defense (DoD) to create some of the highest performing Cyber Teams. Among the DoD partners, CATA testing accurately:

- Classified 97% of all Elite (90% course average or better) performers on a USAF ITF course.

- Distinguished with 84% accuracy between high-skill and untrained USAF cyber personnel.

- Identified six main clusters of test participants that correlated with a variety of course performance metrics across DoD participants (e.g. SOCOM, U.S. Navy, West Point, and USAF) including:

  • High performers in four key disciplines who emerged as top candidates
  • Critical thinkers who scored well in tests such as “Need for Cognition,” “Matrix Reasoning,” and “Dynamic Systems Control”
  • Creative thinkers who scored low on many tasks but who performed well in crucial areas such as “Need for Cognition,” “Need for Cognitive Closure,” and “Pattern Vigilance.”
- CATA results also yielded a composite score for each candidate's total aptitude.

Security Mindsets Principal Charles J. Kolodgy said: “Finding the right candidates and figuring out which employees to invest in additional training are tough decisions that have far ranging impact. The right decision can lead to overall improvement of your organization's security posture, while a poor decision can erode readiness.” He noted the importance of weeding out those with superb qualifications but whose innate skills aren’t a fit for a specific task and career path.

“Cybersecurity is an increasingly complex domain, with a lengthy and arduous learning curve,” said Doug Britton, Haystack Solutions CEO and Founder, and co-developer of CATA. “The commercial sector has long needed insight into the problem solving, visualization, and pattern recognition capabilities of cybersecurity candidates – qualities that certifications and degrees don’t necessarily reflect. The ability to identify those with innate talents and ensure that they’re being trained for the roles for which they’re best suited can help the commercial sector bridge the talent gap more quickly and effectively. CATA meets this urgent challenge.”

Bunting said: “It has been heartening to see it adapted to help identify previously unexplored but inherently genius-level cyber talent. We need to identify everyone that has the cognitive fingerprint of a cyber warrior and get them in the fight.”

Test results will be featured in “Developing Cyber Genius,” a Webinar> on August 4th at 2:30pm Eastern featuring Britton, Bunting and human resources expert Amy Cappellanti-Wolf.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.