Haystack Solutions’ Cyber Aptitude and Talent Assessment (CATA) Reveals Latent Cyber Genius Potential

By Jeff Steuart

Haystack Solutions’ new Cyber Aptitude and Talent Assessment (CATA) has been shown in tests conducted at the University of Maryland’s (UMD) Applied Research Laboratory for Intelligence and Security (ARLIS) Center to provide cybersecurity aptitude assessments that predict candidate success with uncanny precision.

The findings have far-reaching implications for organizations seeking to discover, onboard and promote top candidates in the current cybersecurity talent squeeze. CATA assessments promise to offer insight into the problem solving, visualization, and pattern recognition capabilities of cybersecurity candidates – qualities that certifications and degrees don’t necessarily reflect.

The assessment can aid commercial sector companies in both streamlining the identification and hiring of top candidates, and optimizing the ROI of limited training budgets.

In performance-under-pressure testing of hundreds of DoD participants from SOCOM, U.S. Navy, West Point, and USAF at UMD, CATA identified aptitudes in key areas associated with cybersecurity excellence such as critical thinking, exhaustiveness of approach and practices, initiating behaviors, real-time effectiveness, and responding behaviors.

CATA focuses on five key cerebral dimensions: critical thinking, deliberate action, real-time action, proactive thinking, and reactive thinking. It includes a series of tests designed to measure cognitive abilities and map a candidate’s natural aptitudes within four domains of commercial sector cybersecurity careers: red teams, blue teams, analytics and forensics, and solutions development. The approach effectively opens the ‘black box’ of the cognitive capabilities that separate optimal candidates, measuring aptitudes that aren’t automatically reflected in professional certifications.

CATA testing is shown to enable assessment of candidates regardless of their native language, English-speaking proficiency, or prior experience with IT and cybersecurity principles.

UMD ARLIS Test Results
Michael Bunting, Ph.D., the Director of Cognitive Security and Information Operations at UMD’s ARLIS center, Haystack’s CTO, and technology co-inventor, said: “CATA’s core has been used by the U.S. Intelligence Community and Department of Defense (DoD) to create some of the highest performing Cyber Teams. Among the DoD partners, CATA testing accurately:

- Classified 97% of all Elite (90% course average or better) performers on a USAF ITF course.

- Distinguished with 84% accuracy between high-skill and untrained USAF cyber personnel.

- Identified six main clusters of test participants that correlated with a variety of course performance metrics across DoD participants (e.g. SOCOM, U.S. Navy, West Point, and USAF) including:

  • High performers in four key disciplines who emerged as top candidates
  • Critical thinkers who scored well in tests such as “Need for Cognition,” “Matrix Reasoning,” and “Dynamic Systems Control”
  • Creative thinkers who scored low on many tasks but who performed well in crucial areas such as “Need for Cognition,” “Need for Cognitive Closure,” and “Pattern Vigilance.”
- CATA results also yielded a composite score for each candidate's total aptitude.

Security Mindsets Principal Charles J. Kolodgy said: “Finding the right candidates and figuring out which employees to invest in additional training are tough decisions that have far ranging impact. The right decision can lead to overall improvement of your organization's security posture, while a poor decision can erode readiness.” He noted the importance of weeding out those with superb qualifications but whose innate skills aren’t a fit for a specific task and career path.

“Cybersecurity is an increasingly complex domain, with a lengthy and arduous learning curve,” said Doug Britton, Haystack Solutions CEO and Founder, and co-developer of CATA. “The commercial sector has long needed insight into the problem solving, visualization, and pattern recognition capabilities of cybersecurity candidates – qualities that certifications and degrees don’t necessarily reflect. The ability to identify those with innate talents and ensure that they’re being trained for the roles for which they’re best suited can help the commercial sector bridge the talent gap more quickly and effectively. CATA meets this urgent challenge.”

Bunting said: “It has been heartening to see it adapted to help identify previously unexplored but inherently genius-level cyber talent. We need to identify everyone that has the cognitive fingerprint of a cyber warrior and get them in the fight.”

Test results will be featured in “Developing Cyber Genius,” a Webinar> on August 4th at 2:30pm Eastern featuring Britton, Bunting and human resources expert Amy Cappellanti-Wolf.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.