Academic Talent Order (ATO)The detailed specification of workforce demand by functional role required to meet the growth needs within the region. It is expected that academic institutions will develop curriculum specific to the workforce needs defined in the ATO.
AccountabilityPart of the operational imperative of “clarity, alignment, focus, and accountability”. Accountability is the acceptance of responsibility for honest and ethical conduct towards others and implies a willingness to be judged on performance.
ActionThe process of doing something with a specific aim or objective. The manner in which it is done. In the context of problem solving, action means to parse the problem into smaller components, prioritize the components and tackle the problem component by component.
Advanced Manufacturing ClusterThe Advanced Manufacturing cluster is made up of Firms that earn most or all of their revenue from converting raw materials into finished products by using computer, high precision, and information technologies integrated into the production system.
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
Roles include: all-source analysis, exploitation analysis, language analysis, targets, and threat analysis.
AlignmentPart of the operational imperative of “clarity, alignment, focus, and accountability”. Alignment ensures that everyone in the organization is on the same page with respect to vision, mission and strategies of the organization, thereby improving productivity, matching resources to objectives, and avoiding organizational confusion.
This is a combined cluster made up of several individual clusters based on common synergies. Individual clusters include:
Architecture Cluster: The Architecture cluster is made up of Firms that employ licensed architects and earn most or all of their revenues from the practice of architecture.
Engineering Cluster: The Engineering cluster is made up of Firms that employ professional engineers and earn most or all of their revenues from the practice of engineering.
Assessment ToolOne of two software applications that make up EnterpriseKC’s Talent Platform. The Assessment Tool is a psychometrically valid software application that measures individual aptitudes and interests to identify students and adults with high potential and who are Well-Suited for a successful career in high demand, high opportunity jobs.
Automotive ClusterThe Automotive cluster is made up of firms that earn most or all of their revenue from the design, development, manufacturing, marketing, and selling of motor vehicles, including passenger cars, trucks, farm equipment, and other commercial vehicles as well as components such as engines and body parts.
Aerospace ClusterThe Aerospace cluster is made up of firms that earn most or all of their revenue from designing, building, testing, selling, and maintaining aircraft, aircraft parts, missiles, rockets, or spacecraft as well as the global transportation network that carries goods and passengers by air.
Big DataA collection of structured, unstructured, and multi-structured data from traditional and digital sources such as open-source intelligence that represents a source for ongoing discovery and analysis of regional economic development insights.
Black HatA Hacker who uses their abilities for malicious or selfish purposes. Related Term(s): white hat, grey hat.
Blue TeamA group that defends an enterprise’s information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team). Also, a group that conducts operational vulnerability evaluations and recommends mitigation techniques to customers who need an independent technical review of their cybersecurity posture. Related Term(s): Red Team, White Team.
BrandHow the company is understood by customers and stakeholders.
BusinessOne of the two Firm Classifications. A business is a for-profit entity within a given Cluster that generates less than 70 percent of their revenue from outside of the Region such as local bank, local law firm or accounting firms, or a regional service provider. While all businesses are important to the economic ecosystem, businesses contribute less Economic Lift than an Enterprise.
CBT Engagement PlaybookThe approach and practice for how a Cluster Operative engages with a Cluster Brain Trust. This document is a “how to” recipe for working with and engaging a CBT.
Clarity, Alignment, FocusPart of the operational imperative of “clarity, alignment, focus, and accountability”. Clarity insures a clear and complete understanding of the objectives and key results that are to be accomplished. Alignment ensures that everyone is on the same page with respect to the vision, mission, and strategies. Thus, improving productivity, matching resources to objectives, and avoiding organizational confusion. Focus ensures a concerted effort of energy and resources around the objective to be accomplished.
ClusterClusters are groups of similar firms within a defined geographic area that share common markets, technologies, and workforce skill needs; they are often linked by buyer-seller relationships. Examples include (Cybersecurity, Advanced Manufacturing, Human Life Sciences, and Aerospace).
Cluster All-StarAn individual that demonstrates passion and knowledge for their respective cluster that exceeds the status quo. Willing to go above and beyond the call of duty, to participate in activities devoted to cluster growth and the improvement of our region.
Construction ClusterThe Construction cluster is made of firms specializing in the process of constructing buildings such as homes, retail and office space, factories and plants or infrastructure such as bridges, roads, power grids.
Cluster Brain Trust (CBT)Part of the Cylinder architecture for economic development. A CBT is comprised of a select group of company business executives who have a deep understanding, experience and success within a given cluster. Each CBT works with a Cluster Operative to determine the existing assets and the potential for their cluster and helps develop strategies for each Segment of the Cylinder architecture.
Collect and Operate
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
Roles include: collection operations, cyber operational planning, and cyber operations.
ClientAn Enterprise within a given cluster or a person working for an Enterprise in that cluster. EnterpriseKC Cluster Operatives engage with Clients in their respective clusters to ascertain the factors affecting economic growth including workforce needs, economic policy and financing.
Cloud ComputingA model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Azure Cloud Services is an example of Cloud Computing.
Cluster Cultural IdentityThe level of collaboration and cohesiveness exhibited by the Enterprises, Businesses, Gazelles, Start-ups and universities within a cluster ecosystem.
Cluster Development PlaybookThe approach and practice for how we engage with a new or existing cluster. This document is a “how to” recipe for identifying and growing a cluster. The assigned Cluster Operative is responsible for following the Cluster Development Playbook.
Cluster Development Project Plan (CDPP)Based on the Cluster Development Playbook, the CDPP is a comprehensive action plan covering the first-year activities and actions that take place when defining and engaging new cluster. The CDPP serves as the action-oriented roadmap for the cluster operative assigned to that cluster.
Cluster Enterprise Employment Index (CEEI)One of EKC’s Key Performance Indicators. CEEI is the total workforce tied to Enterprises within a given cluster tracked as a trend line.
Cluster GlossaryA list of terms with accompanying definitions unique to each cluster.
Cluster Gross Enterprise Product (CGEP)One of EKC’s Key Performance Indicators. CGEP is the total amount of revenue generated by the Enterprises in a given cluster, tracked as a total dollar figure. The CGEP from each cluster contributes to the overall Regional Gross Enterprise Product (RGEP).
Cluster LandscapeA Cluster Landscape is an aggregate point-in-time view of the state of a cluster. It includes an overview of the cluster, key enterprises and startups within the cluster, key assets of the cluster and Key Performance Indicators. A Cluster Landscape offers detailed picture of the interconnected network Enterprises, Businesses, Gazelles, Start-ups, suppliers and service providers within a given cluster. The assigned Cluster Operative is responsible for developing and maintaining the Cluster Landscape and publishing it twice each year.
ConfidentialityA property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
CultureThe way people in a company behave and the attitudes and beliefs that inform them.
Cybersecurity Center of ExcellenceA Cluster Development Project Plan for the cybersecurity cluster.
Cybersecurity ClusterThe Cybersecurity cluster is made up of firms that earn most or all of their revenue from the development, manufacturing and sale of technology that identifies, prevents and/or mitigates cyber-attacks or earn most or all of their revenue from services to identify, prevent and mitigate cyber-attacks.
CybersecurityThe activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. Includes strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.
CylinderA three-dimensional representation of EKC’s “Architecture for Economic Development”. The Cylinder graphically depicts the strategies (Pillars), governance model and clusters of emphasis.
Facts, statistics, and observations that make up the EKC data warehouse that serves as the “single source of truth” for the regional economic development ecosystem. The EKC data store consists of three data types:
Structured data – refers to any data that resides in a fixed field within a record or file. This includes data contained in relational databases and spreadsheets;
Unstructured data – refers to any data that resides in variable length fields. This includes Twitter tweets, emails, interview entries, graphic images and videos; and,
Multi-structured data – includes a combination of text and visual images along with structured data such as form or transactional information. This includes data contained in web applications and social media.
Unstructured and multi-structured data is difficult to process and analyze because it has no pre-defined model, meaning it cannot be effectively organized in a relational database. Instead, non-relational, or NoSQL databases, such as MongoDB are often used to manage unstructured data.
Data Aggregation The process of gathering and combining data from different sources, so that the combined data reveals new information. The new information is more sensitive than the individual data elements themselves and the person who aggregates the data was not granted access to the totality of the information.
Data AnonymityData Anonymity is a process used to present statistical summaries of cluster and enterprise data that may be consumed publicly without revealing the private information of any one firm or individual. Several anonymization strategies are employed. Data Anonymity is used as part of EnterpriseKC’s data security and anonymization methodology to safeguard our customers’ information and privacy.
Data Collection ApplicationA proprietary software application designed for use by a Cluster Operative to collect data about an Enterprise from members of the cluster ecosystems.
Data DictionaryA data dictionary is a reference and detailed description of each data element in a database. A data dictionary is used by database architects to understand the business domain, clarify terminology, and connect business concepts to database structures.
Data EncryptionData Encryption is the process of transforming Structured and Unstructured Data into a form that cannot be easily understood by unauthorized people. Encryption is used as part of EnterpriseKC’s data security and anonymization procedures to safeguard our customers’ information and privacy.
Data Integrity The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.
Data MiningThe process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
Data ModelA high-level design which decides what can be present in the schema. It provides a conceptual framework to specify the requirements of the database user and the structure of the database to fulfill these requirements.
Database SchemaDatabase schema is the detailed definition, documentation and physical implementation of a Data Model. A schema is a blueprint of the database and includes all the implementation details that tell the database engine how the data is organized and related.
Data Warehouse Architecture
A data warehouse combines data from multiple disparate sources to support analytical reporting, structured and ad hoc queries. A data warehouse is often referred to as a de facto source of business truth. All data warehouse architecture include the following layers:
Data Source Layer – where the original source data sources reside in the relational database
Data Staging Layer – where the original source data is extracted, transformed (cleansed) and loaded into the data storage layer
Data Storage Layer – where the cleansed data is stored
Data Presentation Layer – where users interact with and query the data for insights, analyze the information to conduct hypothetical business scenarios, and develop automated or ad-hoc reports
Differential PrivacyDifferential Privacy is a Data Anonymity technique used for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals in the dataset. Differential Privacy allows for valid statistical inferences, while preventing the identification of any one firm’s private data.
Digital Health ClusterThe cluster is made up of firms that earn most or all of their revenue from the treatment of patients with curative, preventive, rehabilitative, and palliative care, including hospitals, medical and dental practices, mobile health, wearable devices, telemedicine, personalized medicine, pharmacies, rehabilitative services and health information technology.
The aggregate effect an Enterprise or a Business has on a regional economy. Because the majority of an Enterprise’s revenue is generated outside the region, the Enterprise is effectively importing cash back into the region thereby creating an aggregate effect as those imported dollars go to work locally across the region through taxes, purchases and investments.
A Business, which derives the majority of its revenue from within the region, is not importing cash to the region and is really only moving dollars back and forth within the region. As a result, a Business cannot produce the First Order Economic Impact that an Enterprise creates.
EcosystemA regional network of public, private and academic entities, including enterprises, businesses, universities, financial institutions, venture capital firms, law firms, media companies and consultants that are directly or indirectly connected in support of one or more clusters.
EKC Data Acquisition Model (EKCDAM) Data gathered directly by Cluster Operatives from members of the cluster ecosystems through the Data Collection Application. Most open-source intelligence (OSINT) whether it be government data or data available from third-party commercial data providers lacks timeliness and reliability, particularly when it comes to developing strategies around revenue growth and workforce. Therefore, EKC validates OSINT and other public data with direct sources within each cluster to maximize data integrity and reach a “single source of truth.”
Energy ClusterThe Energy cluster is made up of firms that earn most or all of their revenue from the production and sale of energy, including extraction, manufacturing, refining and distribution of fuel, electricity, natural gas and wind energy.
Enterprise and Business Services ClusterThe Enterprise and Business Services cluster is made up of firms that earn most or all of their revenue from work that supports a business but does not produce a tangible commodity such as employment agencies, staffing services, answering services and training firms as well as building maintenance, housekeeping and waste disposal or recycling services.
Entertainment, Sports, and Media ClusterThe Entertainment, Sports, and Media cluster is made up of firms that earn most or all their revenue from media, sports and entertainment, including movies, TV shows, radio shows, live performances, news, music, newspapers, magazines, books, greeting cards, professional and amateur soccer, baseball, football, basketball and hockey. The cluster also includes firms that earn most or all their revenue from consumer services, including lodging, food and beverage services such as restaurants and bars, event planning, travel services, theme parks, casinos and additional firms related to tourism.
EnterpriseOne of the two Firm Classifications. An Enterprise is a company within a given Cluster that generates more than 70% of its revenue from outside the region. Because the majority of an Enterprise’s revenue is generated outside the region, an Enterprise can create greater economic lift for the region. Examples include Cerner, Hallmark and Garmin. There are two types of Enterprises – Primary and Secondary.
Enterprising AcademicsSecondary and higher education academicians who understand markets, their customers and the markets their institutions serve. They create a product (graduating students) that meets the talent needs of their customers (Enterprises).
Enterprise ClassificationPart of the Firm Classification Model, which further designates an Enterprise based on the location of its corporate headquarters. An enterprise is designated as a Primary Enterprise if its corporate headquarters is located within the region. If the Enterprise’s corporate headquarters is not based with the region, the Enterprise is designated as a Secondary Enterprise. Examples of Primary Enterprises include Cerner, Hallmark and Garmin. Examples of Secondary Enterprises include General Motors, Ford and Turner Construction.
EnterpriseKC (EKC)A high-performing 501(C)(3) enterprise that builds enterprises on a cluster by cluster basis. EKC associates have an entrepreneurial bent, leverage the vision-to-value success formula and employ the best practices of an enterprise, to build new enterprises and accelerate the growth of the regional gazelles and start-ups to create significant economic lift for the region.
ExperienceThe first-person effects or influence of an event gained through that person’s involvement in or exposure to the event. Experience is ephemeral by nature – the work of the performer perishes once the performance is completed; however, the value of the experience lingers for anyone involved through their memories. By paying attention to “the hundreds of little things” those seemingly minor, picky points that others may not pay attention to, the lingering memories are positive. At EnterpriseKC we view each “experience” as brand-building moments; moments we painstakingly create that are part of Value Creation.
Experiential LearningWork-based experience incorporated into the education process for students of all ages. Students complete meaningful workplace job tasks that develop readiness for work, knowledge, and skills (market value assets) that support entry or advancement in a particular career field. Also referred to as Real World Learning or Work Based Learning.
Financial Services and Insurance Cluster
This is a combined cluster made up of two individual clusters based on common synergies. Individual cluster include:
Financial Services Cluster:
The Financial Services cluster is made up of firms that earn most or all of their revenue from providing services that manage money including banks, investment banks, credit unions, credit-card companies, accountancy companies, consumer-finance companies, stock brokerages, investment funds, and individual money managers.
The Insurance cluster is made up of firms that earn most or all of their revenue from providing insurance and risk management against contingency or uncertain losses including insurance carriers and brokers.
FirmAn economic entity that buys and sells products and/or services to with the aim of making a profit. The term is synonymous with ‘company’, or ‘business’. Any corporation, limited liability company, public limited company, sole proprietorship, or partnership that has products or services for sale is classified as a firm.
Firm Classification ModelA method for categorizing a Firm based on the percentage of revenue it produces from outside the region. There are two Firm Classification categories: Business and Enterprise. The Firm Classification Model also leverages federal NAICS codes and SIC codes to further categorize a firm into a Cluster.
First Order Economic ImpactThe economic value directly attributed to the Enterprises in that region through the jobs they generate and the magnitude of the purchases those job holders make in total. First Order Economic Impact provides an objective and traceable means to measure economic growth. It replaces the generally flawed approach commonly used by economic development organizations, which relies on multiple layers of data that end up overstating the actual economic impact.
FocusPart of the operational imperative of “clarity, alignment, focus and accountability”. Focus ensures a concerted effort of energy and resources around to objective to be accomplished.
GazelleA high-growth company characterized by rapid revenue growth, rather than absolute size. For EKC classification purposes, Gazelles will show a year-over-year revenue increase of at least 20% each year for at least three consecutive years.
Gross Domestic Product (GDP)A monetary measure of the market value of all goods and services produced by a country in a specific time period.
Governance and Thinking Task Force (TTF)Select business, government and civic leaders who serve as the governing entity overseeing the entire EKC Cylinder Architecture for economic development. TTF members create a standardized approach across all clusters of the cylinder and ensure that all clusters are operating based on the same doctrine.
Government-Not for Profit ClusterThe Government-Not for Profit cluster is made up of federal, state and local government offices that reside within the region as well as not-for-profit firms within the region.
Hack An unauthorized attempt to gain access to an information system. Related Term(s): hacker, white hat, black hat, grey hat.
Hacker An unauthorized user who attempts to or gains access to an information system. Related Term(s): hacktivist.
Hacktivist A computer hacker whose activity is aimed at promoting a social or political cause.
Hash ValueIn data science, a numeric value resulting from applying a mathematical algorithm against a set of data such as a file. Synonym(s): cryptographic hash value. Related Term(s): hashing.
HashingIn data science, a process of applying a mathematical algorithm against a set of data to produce a numeric value (a ‘hash value’) that represents the data. Mapping a bit string of arbitrary length to a fixed length bit string to produce the hash value. Related Term(s): hash value.
Human Life Sciences ClusterThe Human Life Sciences cluster is made up of firms that earn most or all of their revenue from the science and business of producing commercial research and testing, biotechnology, and medical instruments and devices.
Identity and Access Management The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.
Incident Response Plan A set of predetermined and documented procedures to detect and respond to a cyber incident.
Information Security Policy An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information. Related Term(s): security policy.
Information Sharing An exchange of data, information, and/or knowledge to manage risks or respond to incidents.
Information Technology Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.
Integrated Risk Management The structured approach that enables an enterprise or organization to share risk information and risk analysis and to synchronize independent yet complementary risk management strategies to unify efforts across the enterprise. Related Term(s): risk management, enterprise risk management.
InteroperabilityThe ability of two or more systems or components to exchange information and to use the information that has been exchanged.
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence.
Roles include: cyber investigation and digital forensics.
k-Anonymity / Topic modelingk-Anonymity / Topic modeling is a Data Anonymity technique used for summaries of Unstructured Data such as free text survey responses. With this technique, the attributes of any one firm in an analysis will be indistinguishable from those of at least one other firms. Summaries are presented in the form of generalizations, or latent topics, derived from the raw data. As a result, no raw data provided by interviewees will be included in the summaries, and any broad generalizations learned from the raw data will be relevant for at least some predefined number (k) of firms in the population.
KnowledgeA retrievable set of concepts within memory.
Knowledge Management Processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Key Performance Indicators (KPIs)A set of quantifiable measures used to gauge performance over time. EnterpriseKC measures Regional Gross Enterprise Product, Regional Enterprise Employment Index, Cluster Gross Enterprise Product, Cluster Enterprise Employment Index, and Shift Share by cluster.
Legal ClusterThe Legal cluster is made up of firms that employ professional attorneys and earn most or all of their revenues from the practice of law or in support of those engaged in the practice of law such as court reporters and paralegals.
Logistics-Transportation ClusterThe Logistics-Transportation cluster is made up of firms that earn most or all of their revenue from moving people, products and materials from one place to another by ground, water, or air and/or the infrastructure to do so.
MarketAll of the buyers and sellers of a specific products or service.
Market Value AssetsIndustry-valued and recognized skills that create a more seamless transition from school to postsecondary education and / or the workplace. Generally obtained through internships, apprenticeships, select industry-recognized credentials, entrepreneurial experiences, provisional patents and paid work experience in the area of career interest.
This is a combined cluster made up of several individual clusters based on common synergies. Individual clusters include:
The Marketing cluster is made up of Firms that earn most or all of their revenue from the promotion of products, ideas or people to consumers, clients and the general public, including advertising agencies, market research firms, public relations, and marketing communications agencies.
The Printing cluster is made up of Firms that earn most or all of their revenue from creating printed material such as books, brochures, marketing collateral and advertising.
The second component of the V success formula. Mission is the actionable and achievable extension of the Vision, defining how much and by when. EnterpriseKC’s Mission is:
1. Keep the jobs and the talent we have / don’t lose the jobs or the talent that we have in the region.
2. Focus on growing Enterprises to expand the existing job base.
National Initiative for Cybersecurity Education (NICE)
A common framework for job classification developed by the National Security Agency and the U.S. Department of Homeland Security. The framework groups together cybersecurity work and tasks that share common functions, regardless of job titles or other occupational terms, providing a common, simplified way to speak about cybersecurity roles and jobs.
The NICE Framework defines seven functional categories, each comprising of several specialty areas or work roles. Within each work role the NICE Framework defines the tasks required to perform the role, as well as the knowledge, skills and abilities required to perform those tasks.
Recently, the NICE Framework interactive website was upgraded to include capability indicators. Capability indicators are a combination of education, certification, training, experiential learning, and continuous learning attributes that could indicate a greater likelihood in an individual’s ability to perform a given work role. The indicators are further delineated by entry level, intermediate and advanced capabilities for each work role within a category.
n-Dimensional ClusterA Cluster with workforce roles and other attributes that extend beyond the individual cluster. The Financial Services Cluster, The Marketing-Printing Cluster the Technology Cluster and the Cybersecurity Cluster are all examples of n-dimensional clusters. For n-dimensional clusters, workforce roles and demand forecasts must be viewed both within the cluster as well as across multiple clusters to develop an accurate view of regional demand.
North American Industry Classification System (NAICS) The Federal standard for classifying business establishments for the purpose of collecting, analyzing, and publishing data related to the U.S. business economy. For EKC cluster classification purposes, entities assigned multiple NAICS codes will be consolidated into a single code within the EKC data store.
Non-Repudiation A property achieved through cryptographic methods to protect against an individual or entity falsely denying having performed a particular action related to data. Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message.
Operate and Maintain
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.
Roles include: customer service and technical support, data administration, knowledge management, network services, system administration, and system analysis.
Oversee and Govern
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.
Roles include: cybersecurity management, executive cyber leadership, legal advice advocacy, program management and acquisition, strategic planning and policy, and training, education, and awareness.
PathwayA series of tracks or actions that can be taken to achieve a common result.
Penetration TestingAn evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system. Synonym(s): pen testing, pen test.
Pen TesterCybersecurity work where a person a person uses software tools and techniques to attempt to “attack” a computer system to evaluate the security of that system. Pen testers look to identify both vulnerabilities or weaknesses, including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed. Falls into the NICE Framework category, Protect and Defend.
PeopleThe most precious asset of any high-performance organization. To win in the marketplace requires first winning the people game, and to win the people game requires a maniacal focus on the Associate experience.
Personal Identifying Information / Personally Identifiable Information (PIP)The information that permits the identity of an individual to be directly or indirectly inferred.
Eight discrete strategies depicted on the top of the Cylinder in support of the Vision, Mission, and Objectives of economic development of a specific cluster. Pillars include:
Pillar 1: Opportunity Analysis, Vision Description & Branding
Pillar 2: Workforce Education and Training
Pillar 3: Workforce Supply Chain
Pillar 4: Research and Commercialization Supply Chain
Pillar 5: Enterprise Growth
Pillar 6: Network Development
Pillar 7: Infrastructure and Finance
Pillar 8: Metrics / Analytics Big Data (Single Source of Truth)
Pillar LeaderAn EKC associate accountable for leading one of the Pillars.
Plant and Animal Sciences ClusterThe Plant and Animal Sciences cluster is made up of Firms that earn most or all of their revenue from the practice of agriculture, the support of the practice of agriculture, food processing and beverage processing for preparation and consumption, including supermarkets and grocery stores. In addition, the cluster includes Firms that earn most or all their revenue from the science and business of producing domestic livestock species or applying principles of the biological, physical, and social sciences to the problems associated with livestock research, production and management.
PlaybookA process document detailing the procedures for a given process or methodology.
Primary EnterpriseAn Enterprise is designated as a Primary Enterprise if its corporate headquarters is located within the region. A Primary Enterprise has the greatest potential impact on the regional economy because of the effect of the dollars imported back to the region and the employment growth within the region. Examples of Primary Enterprises include Cerner, Hallmark and Garmin.
Privacy The assurance that the confidentiality of, and access to, certain information about an entity is protected. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
The fifth component of the V
success formula. Process are documented, repeatable methods to accomplish work in a predictable manner. Process documents are often instantiated in the form of a Playbook.
Protect and Defend
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks.
Roles include: cyber defense analysis, cyber defense infrastructure support, incident response, and vulnerability assessment and management.
PsychometricRefers to the scientific study of measuring psychological traits such as knowledge, skills, abilities, aptitudes, and personality traits. It involves the use of various standardized tests and measurements to evaluate these traits and provide a quantitative assessment of an individual’s abilities and characteristics.
Real Estate ClusterThe Real Estate cluster is made up of firms that earn most or all of their revenue from the buying, selling or leasing of properties used as homes or for non-professional purposes as well as real estate used for business purposes such as factories, plants, retail and office space, including shared workspace and business incubation services.
Real World Learning (RWL)Work-based experience incorporated into the education process for students of all ages. Students complete meaningful workplace job tasks that develop readiness for work, knowledge, and skills (market value assets) that support entry or advancement in a particular career field. Also referred to as Experiential Learning or Work Based Learning.
Red TeamA group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture. Related Term(s): Blue Team, White Team.
Red Team ExerciseAn exercise, reflecting real-world conditions, that is conducted as a simulated attempt by an adversary to attack or exploit vulnerabilities in an enterprise’s information systems. Related Term(s): cyber exercise.
RegionInitially, Region is defined as all of Kansas and Western Missouri to roughly Columbia, Missouri.
Regional Enterprise Employment Index (REEI)One of EKC’s Key Performance Indicators. The total workforce tied to Enterprises within the Region tracked as a trend line.
Regional Gross Enterprise Product (RGEP)One of EKC’s Key Performance Indicators. The total amount of revenue generated by the Enterprises in the Region, tracked as a total dollar figure. The CGEP from each cluster contributes to the overall RGEP.
An outcome that creates value. Results MUST be measured. Results are measured three ways:
Attainment – the achievement of a discrete measurable goal: it’s a yes or a no.
Trend – a quantitative review of attainment versus plan over a defined period of time.
Variance – the amount of spread in what was expected versus what was planned.
Risk ManagementThe process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken. Related Term(s): enterprise risk management, integrated risk management, risk.
Risk Mitigation The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences. Implementing appropriate risk-reduction controls based on risk management priorities and analysis of alternatives.
Secondary EnterpriseA Secondary Enterprise is an Enterprise whose corporate headquarters is located outside the region. The potential economic impact of a Secondary Enterprise is less than a Primary Enterprise because the revenue dollars go to another region. However, that does not diminish the importance of a Secondary Enterprise because they can employ hundreds or thousands within the region. Examples of Secondary Enterprises include General Motors, Ford and Turner Construction.
One of the categories in the National Initiative for Cybersecurity Education (NICE) framework for job classifications. This category Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.
Roles include: risk management, software development, systems architecture, systems requirements planning, test and evaluation.
Shift ShareOne of EKC’s Key Performance Indicators. Shift Share is the amount of regional job growth that can be attributed to national trends and how much is due to unique regional factors based on (1) industrial mix effect, (2) national growth effect, and (3) regional competitive effect over time.
Single Source of Truth (SSoT) Vision
Imagine a single, comprehensive source of actionable information containing data from industry, academia, and economic development stakeholders.
Imagine a single, comprehensive source of actionable information able to report employment, enterprise growth, and innovation across the region.
Imagine a single, comprehensive source of actionable information that aggregates the number of high-demand, high-opportunity jobs needed in the next year, in 3 years, in 5 years.
Imagine a single, comprehensive source of actionable information that identifies the firms in the region that have the best opportunity to grow and the high potential workforce contributors in each cluster.
Situational Awareness Comprehending information about the current and developing security posture and risks, based on information gathered, observation and analysis, and knowledge or experience. In cybersecurity, comprehending the current status and security posture with respect to availability, confidentiality, and integrity of networks, systems, users, and data, as well as projecting future states of these.
Skilled LaborSkilled labor is the portion of workers that have specific, technical industry skills relating to business and the production of goods. Engineers, welders, accountants and scientists are a few examples of skilled labor. These individuals bring specialized skill sets to the marketplace and are essential in advancing industries through developing new techniques or methods of productions.
Standard Occupational Code (SOC)Federal standard for classify workers into occupational categories for the purpose of disseminating workforce data. All workers are classified into one of 840 detailed occupations according to their occupational definition.
Start-upA company started in Kansas or Western Missouri by one or more entrepreneurs to develop a repeatable and scalable business model that meets a market need or solves a business problem. EKC classifies a Start-up as a new company that adds fewer than 20 new employees annually and/or grows revenues less than 20% annually.
StrategyThe third component of the V2 success formula. Strategy is the actionable pathway to achieve the Vision and Mission. EKC’s strategies are instantiated in the Pillars represented in the top view of the Cylinder.
The fourth component of the V
Success formula, which follows Strategy. Structure consists of optimizing the organizational relationships of people and functions to achieve results. Three functional groups will work across the four Dimensions and carry out EnterpriseKC’s mission.
Client Services Team (CST)
– includes cluster operatives and business analysts. The CST takes a management consulting approach to identify and interview the Enterprises, Gazelles, and Start-ups in a given cluster and work with the PDT to develop those organizations to keep the jobs we have and expand the existing job base. CST associates will also work collaboratively with the economic development organizations across the region to ensure programs and efforts have an additive effect.
Workforce Demand Team (WDT)
– Will work with the CST to develop data-driven, metrics forecasting job growth and workforce specifications in the region. The WDT will also work with the data analytics team to look at workforce demand and common workforce attributes across clusters.
Data Analytics Team (DAT)
– includes data scientists, data analysts, database administrators. The DAT will collect, analyze and build econometric models to understand the drivers of growth in each cluster and the region as a whole. The DAT team is charged with building and maintaining the “single source of truth”.
Structured DataStructured data is data that is highly organized and formatted in a way so it's easily searchable in relational databases. Think of data that fits neatly within fixed fields and columns in relational databases and spreadsheets. Examples of structured data include names, dates, addresses, credit card numbers, geolocation, employee count and revenue.
Supply ChainA system of organizations, people, activities, information and resources, for creating and moving products including product components and/or services from suppliers through to their customers. Related Term(s): supply chain risk management.
SystemAn interconnected network of principles and procedures according to which something is done; a set of things working together as parts of an organized framework.
Talent ExchangeThe second of two software applications that make up EnterpriseKC’s Talent Platform. The Talent Exchange serves as an interconnected ecosystem for cybersecurity (and eventually other) talent to accelerate connections between existing cybersecurity talent and the demand sources for that talent. The Talent Exchange will also connect those Well-Potentialed and Well-Suited individuals with resources, coaching and mentoring that help them become Well-Qualified for a career in cybersecurity.
Talent PlatformThe Talent Platform is a comprehensive software suite made up of two key components: the Talent Assessment Tool and the Talent Exchange. The Talent Platform will create mutually beneficial experiences for talent and regional enterprises to accelerate connections that accelerate hiring well-suited, well-qualified, and well-potentialed talent. The Platform will provide pathways to experiential learning, real-world experiences, and networking opportunities to solve the current challenges enterprises face in sourcing strong cyber talent for in-demand jobs. (see Assessment Tool and Talent Exchange)
TaskAn activity directed toward the achievement of organizational objectives.
Technology ClusterThe Technology cluster is made up of firms that earn most or all of their revenue from the development, manufacturing and sale of technology applied to other markets or earn most or all of their revenue from providing technology as a service.
ToolsConstructed devices and applications used to aid in achieving results.
UnicornAny Start-up company that reaches a market valuation of $1 billion as determined by public or private investment.
Unskilled LaborUnskilled labor refers to workers who lack technical training and expertise. Unskilled labor is the cheaper and less technical portion of the workforce that makes up a large part of an economy’s labor market. This workforce plays the important part of performing daily production tasks that do not require technical abilities.
Unstructured DataUnstructured data is data that has no pre-defined format or organization. Unstructured data is difficult to process and analyze because it has no pre-defined model, meaning it cannot be effectively organized in a relational database. Instead, non-relational, or NoSQL databases, are often used to manage unstructured data. Examples of unstructured data include free form text, video, audio, and still imagery.
The importance, worth, or usefulness of something as defined by a Client. Value is the perception of what something is worth to a Client as compared to possible alternatives. Value can be expressed by the formula V = B - C, where V is the value created, B the benefits perceived and C the costs or investment made.
Benefits include the advantages offered, the image and brand, and the experience and success one gets in using the product or service. Cost is not only the payment for use but also non-price terms such as time, effort, energy, and inconvenience.
Value CreationAny innovation to a product, service, process, policy or business model that improves the Client experience. Value is created both by a focus on processes and systems and by mind-set and culture in order to create a positive, memorable Experience for a Client.
The key driving component of the V2 Success formula. Vision is a vivid description of a future state. For EnterpriseKC the vision is:
Imagine a Region:
In which there is a single entity that persistently DRIVES enterprise development and job growth by identifying and supporting the highest-potential enterprises regardless of stage;
Imagine a Region:
In which there is a single entity that KNOWS, based on empirical evidence and data-driven assessments, about enterprises’ long-term potential, their needs, and their trajectories of change.
) Success Formula
A planning framework consisting of six components that, if followed in the proper sequential order, helps to insure consistent results. The V
success formula is depicted as: Vision + Mission + Strategy + Structure + Process + Tools = Results
Well-PotentialedAn individual that may not know they have certain aptitudes or have a specific career on their radar, but who with specific training can successfully operate in the field. This individual has certain aptitudes, characteristics, and behaviors that map to a company’s best performers.
Well-QualifiedAn individual that carries a suitable level of experience and carries formal qualifications and experience that would make them competent for a defined role.
Well-SuitedAn individual that may or may not have the necessary qualifications of a defined role, but who really like the work and tasks that the job requires. This individual is a strong cultural fit with a particular career field and has a clear motivation and eagerness to perform well.
White HatA Hacker who uses their abilities to identify security weaknesses in systems in a way that will allow the system’s owners to fix the weakness. Related Term(s): black hat.
White TeamA group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems. Related Term(s): Blue Team, Red Team.
Wholesale-Retail ClusterThe Wholesale-Retail cluster is made up of firms that earn most or all of their revenue from selling of finished products to end user consumers, including multi-store retail chains and individual stores, supermarkets, grocery stores, online sales outlets and/or from the sale of goods or merchandise to retailers; to industrial, commercial, institutional, or other professional business users; or to other wholesalers and related subordinated services.