Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
|-
|-
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
|-
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "World Cybersecurity Technology Research Summit (Belfast 2011) "]||||
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "World Cybersecurity Technology Research Summit (Belfast 2011) "]||||
|-
|-
Line 16: Line 17:
|-
|-
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 "America’s Cyber Future: Security and Prosperity in the Information Age "]||||
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 "America’s Cyber Future: Security and Prosperity in the Information Age "]||||
| ||1899-12-30||[-- ""]||||
|-
|-
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report "Resilience of the Internet Interconnection Ecosystem, at: "]||||
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report "Resilience of the Internet Interconnection Ecosystem, at: "]||||

Revision as of 16:08, 8 June 2012

Filtering for category: All Categories

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"
Business Roundtable 2012-10-11 "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "
Centre for Secure Information Technologies 2012-09-11 "World Cybersecurity Technology Research Summit (Belfast 2011) "
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "
Center for a New American Security 2012-06-11 "America’s Cyber Future: Security and Prosperity in the Information Age "
European Network and Information Security Agency (ENISA) 2011-04-11 "Resilience of the Internet Interconnection Ecosystem, at: "
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 "Cybersecurity Two Years Later "
National Research Council 2010-09-21 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 Security Threats in Cyberspace FINAL 09-15-09.pdf "National Security Threats in Cyberspace "
GAO 2012-02-28 "Cybersecurity: Challenges to Securing the Modernized Electricity Grid " Government Report
GAO 2011-12-09 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use " Government Report