Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 31: | Line 31: | ||
|- | |- | ||
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "]||Government Report || | | GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "]||Government Report || | ||
|- | |||
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 "Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: "]||Government Report || | |||
|- | |||
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "]||Government Report || | |||
|- | |||
| GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T "Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "]||Government Report || | |||
|- | |||
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 "Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements "]||Government Report || | |||
|- | |||
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "]||Government Report || | |||
|- | |||
| GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R "Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates "]||Government Report || | |||
|- | |||
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T "Continued Attention Needed to Protect Our Nation’s Critical Infrastructure "]||Government Report || | |||
|- | |||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 "Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities "]||Government Report || | |||
|- | |||
| GAO||2010-08-16||[http://www.gao.gov/products/GAO-10-628 "Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "]||Government Report || | |||
|- | |||
| GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 "Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain "]||Government Report || | |||
|- | |||
| GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T "Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "]||Government Report || | |||
|- | |||
| GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 "Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "]||Government Report || | |||
|- | |||
| GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 "Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk "]||Government Report || | |||
|- | |||
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 "Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed "]||Government Report || | |||
|- | |||
| GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 "DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened "]||Government Report || | |||
|- | |||
| GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 "Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems "]||Government Report || | |||
|- | |||
| GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 "United States Faces Challenges in Addressing Global Cybersecurity and Governance "]||Government Report || | |||
|- | |||
| GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 "Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing "]||Government Report || | |||
|- | |||
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t "Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "]||Government Report || | |||
|- | |||
| GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t "Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: "]||Government Report || | |||
|- | |||
| GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T "Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "]||Government Report || | |||
|- | |||
| GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 "Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies "]||Government Report || | |||
|- | |||
| GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative "]||Government Report || | |||
|- | |||
| GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t "Continued Efforts Are Needed to Protect Information Systems from Evolving Threats "]||Government Report || | |||
|- | |||
| GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 "Efforts to Improve Information sharing Need to Be Strengthened "]||Government Report || | |||
|- | |||
| White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf "Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program "]||Government Report || | |||
|- | |||
| White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- "Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information "]||Government Report || | |||
|- | |||
| White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf "FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa "]||Government Report || | |||
|- | |||
| White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf "International Strategy for Cyberspace "]||Government Report || | |||
|- | |||
| White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal "Cybersecurity Legislative Proposal (Fact Sheet) "]||Government Report || | |||
|} | |} | ||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 15:21, 8 June 2012
Filtering for category: All Categories