Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 26: Line 26:
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "]||||
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "]||||
|-
|-
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National Security Threats in Cyberspace FINAL 09-15-09.pdf  "National Security Threats in Cyberspace "]||||
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  "National Security Threats in Cyberspace "]||||
|-
|-
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||

Revision as of 15:10, 8 June 2012

Filtering for category: All Categories

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"
Business Roundtable 2012-10-11 "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "
Centre for Secure Information Technologies 2012-09-11 "World Cybersecurity Technology Research Summit (Belfast 2011) "
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "
Center for a New American Security 2012-06-11 "America’s Cyber Future: Security and Prosperity in the Information Age "
European Network and Information Security Agency (ENISA) 2011-04-11 "Resilience of the Internet Interconnection Ecosystem, at: "
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 "Cybersecurity Two Years Later "
National Research Council 2010-09-21 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 "National Security Threats in Cyberspace "
GAO 2012-02-28 "Cybersecurity: Challenges to Securing the Modernized Electricity Grid " Government Report
GAO 2011-12-09 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use " Government Report