Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 87: | Line 87: | ||
|- | |- | ||
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | | DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | ||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence)||2012-04-26||[http://homeland.house.gov/hearing/joint-subcommittee-hearing-iranian-cyber-threat-us-homeland Iranian Cyber Threat to U.S. Homeland]||Government Hearing||3.2.1 States,<br>3.3 Security Targets,<br>4.12 Cyberwar||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||Government Hearing||3.1 The Threat and Skeptics,<br>3.2 Actors and Incentives||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence)||2012-04-19||[http://homeland.house.gov/hearing/subcommittee-hearing-dhs-and-doe-national-labs-finding-efficiencies-and-optimizing-outputs The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development]||Government Hearing||4.2.1 Risk Management and Investment,<br>5.3 Government Organizations,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology)||2012-03-28||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9397 Cybersecurity:Threats to Communications Networks and Public-Sector Responses]||Government Hearing||3.3.3 Communications,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2012-03-27||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9393 IT Supply Chain Security: Review of Government and Industry Efforts]||Government Hearing||4.3 Supply Chain Issues||No | |||
|- | |||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2012-03-20||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=92823c77-38f0-4c20-a3ee-36729e8e19a3&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2012 Fiscal 2013 Defense Authorization: IT and Cyber Operations]||Government Hearing||4.2.1 Risk Management and Investment,<br>Government Organizations||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology)||2012-03-07||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9342 Cybersecurity:Networks The Pivotal Role of Communications]||Government Hearing||3.3.3 Communications,<br>5.3 Government Organizations,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight)||2012-02-29||[http://science.house.gov/hearing/subcommittee-investigations-and-oversight-hearing-nasa-cybersecurity-examination-agency%E2%80%99s NASA Cybersecurity: An Examination of the Agency’s Information Security]||Government Hearing||3.3.1 Public Critical Infrastructure,<br>5.3 Government Organizations,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2012-02-28||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9318 Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security]||Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.2.1 Risk Management and Investment||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||Government Hearing||3.1 The Threat and Skeptics,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology)||2011-12-01||[http://smallbusiness.house.gov/Calendar/EventSingle.aspx?EventID=270278 Cyber Security: Protecting Your Small Business]||Government Hearing||4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on the Judiciary||2011-11-16||[http://judiciary.house.gov/hearings/hear_11162011.html Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act)]||Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security)||2011-11-15||[http://judiciary.house.gov/hearings/hear_11152011.html Cybersecurity: Protecting America’s New Frontier]||Government Hearing||4.10 Privacy,<br>4.11 Cybercrime||No | |||
|- | |||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-11-03||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=42c170fb-8e0c-453a-81a2-f4ee3fa89283&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=11&YearDisplay=2011 Institutionalizing Irregular Warfare Capabilities]||Government Hearing||4.12 Cyberwar||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology)||2011-10-06||[http://homeland.house.gov/hearing/cloud-computing-what-are-security-implications Cloud Computing: What are the Security Implications?]||Government Hearing||3.3.3.3 Cloud Computing,<br>4.13 Espionage,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||Government Hearing||4.7 Public-Private Cooperation,<br>4.13.2 Industrial Espionage,<br>5.4 International Cooperation||No | |||
|- | |||
| U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation)||2011-09-21||[http://science.house.gov/hearing/technology-and-innovation-subcommittee-hearing-cloud-computing The Cloud Computing Outlook]||Government Hearing||3.3.3.3 Cloud Computing,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit)||2011-09-14||[http://financialservices.house.gov/Calendar/EventSingle.aspx?EventID=258792 Combating Cybercriminals]||Government Hearing||3.3.1.1 Government Networks (.gov),<br>3.3.2.2 Financial Institutions and Networks,<br>5.7 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2011-07-26||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8824 Cybersecurity: Infrastructure An Overview of Risks to Critical]||Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||Government Hearing||3.3 Security Targets,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Financial Services (field hearing in Hoover, AL)||2011-06-29||[http://financialservices.house.gov/Calendar/EventSingle.aspx?EventID=246611 Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information]||Government Hearing||3.3.2.2 Financial Institutions and Networks,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||Government Hearing||3.3.1.1 Government Networks (.gov),<br>4.9 Identity Management,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade)||2011-06-02||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8653 Sony and Epsilon: Lessons for Data Security Legislation]||Government Hearing||4.9 Identity Management,<br>5.1 Regulation/Liability,<br>5.2 Private Efforts/Organizations||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce||2011-05-31||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8639 Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act]||Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education)||2011-05-25||[http://science.house.gov/hearing/subcommittee-research-and-science-education-subcommittee-technology-and-innovation-%E2%80%93-joint Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts]||Government Hearing||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||Government Hearing||4.7 Public-Private Cooperation,<br>4.11 Cybercrime,<br>5.2 Private Efforts/Organizations||No | |||
|- | |||
| U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||Government Hearing||3.1 The Threat and Skeptics,<br>3.3.1 Public Critical Infrastructure,<br>4.7 Public-Private Cooperation||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||Government Hearing||3.3.2 Private Critical Infrastructure,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations)||2011-04-15||[http://foreignaffairs.house.gov/hearing_notice.asp?id=1279 Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology]||Government Hearing||3.2.1 Governments,<br>4.12 Cyberwar,<br>4.13 Espionage||No | |||
|- | |||
| U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||Government Hearing||4.2 Economics of Cybersecurity,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||Government Hearing||3.1 The Threat and Skeptics,<br>3.3 Security Targets,<br>4.2 Economics of Cybersecurity||No | |||
|- | |||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||Government Hearing||3.3.1.2 Military Networks (.mil),<br>4.2 Economics of Cybersecurity||No | |||
|- | |||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=2&YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||Government Hearing||3.1 The Threat and Skeptics,<br>4.12 Cyberwar,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||Government Hearing||3.3.2 Private Critical Infrastructure,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||Government Hearing||3.1 The Threat and Skeptics,<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | |||
|- | |||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||Government Hearing||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Permenant Select Committee on Intelligence||2011-12-01||[https://intelligence.house.gov/markup/mark-hr-xxxx-%E2%80%9Ccyber-intelligence-sharing-and-protection-act-2011%E2%80%9D Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011]||Government Hearing||4.6 Information Sharing,<br>5.1 Regulation/Liability||No | |||
|- | |||
| U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||Government Hearing||4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | |||
|- | |||
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||Government Hearing||4.6 Information Sharing/Disclosure,<br>4.10 Privacy,<br>5.1 Regulation/Liability||No | |||
|} | |} | ||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 15:46, 21 June 2012
Filtering for type: All Types
Author/Agency | Date | Title | Type | Category | Synopsis |
White House | 2009 | Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure | Government Report | 1. Overview, 4.7 Public-Private Cooperation |
No |
White House | 2011-04 | National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management |
No |
White House | 2011-05 | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Government Report | 1. Overview | No |
NSTC | 2011-12 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations | No |
White House | 2012-01 | National Strategy for Global Supply Chain Security | Government Report | 4.3 Supply Chain Issues | No |
White House | 2012-02 | Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy | Government Report | 4.10 Privacy, 5.1 Regulation/Liability |
No |
Kundra, Vivek | 2011-02-08 | Federal Cloud Computing Strategy | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Kundra, Vivek | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
PCAST | 2010-12 | Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology | Government Report | 4.3 Supply Chain Issues, 4.10 Privacy, 5.3 Government Organizations |
No |
PCAST | 2011-06 | Report to the President on Ensuring American Leadership in Advanced Manufacturing | Government Report | 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
No |
DHS | 2009-11 | A Roadmap for Cybersecurity Research | Government Report | 1. Overview, 4.2.1 Risk management and Investment |
No |
DHS | 2009-09-16 | National Cyber Leap Year Summit 2009: Co-Chairs' Report | Government Report | 3.3 Security Targets, 4.2 Economics of Cybersecurity, 4.8 Attribution |
No |
DHS | 2010-09 | National Cyber Incident Response Plan | Government Report | 3. Threats and Actors, 5.3 Government Organizations |
No |
Department of Commerce, Internet Policy Task Force | 2011-06 | Cybersecurity, Innovation and the Internet Economy | Government Report | 4.2 Economics of Cybersecurity, 4.7 Public-Private Cooperation |
No |
DOD | 2011-07-14 | Department of Defense Strategy for Operating in Cyberspace | Government Report | No | |
DHS | 2011-11 | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
No |
National Initiative for Cybersecurity Education | 2011-08-11 | National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation | Government Report | 1. Overview, 5.3 Government Organizations |
No |
Energy Sector Control Systems Working Group | 2011-09 | Roadmap to Achieve Energy Delivery Systems Cybersecurity | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
GAO | 2011-07-25 | Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities | Government Report | No | |
GAO | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination | Government Report | No | |
GAO | 2011-07-26 | Continued Attention Needed to Protect Our Nation’s Critical Infrastructure | Government Report | No | |
GAO | 2011-10-03 | Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements | Government Report | No | |
GAO | 2010-10-06 | Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed | Government Report | No | |
GAO | 2010-06-16 | Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | No | |
GAO | 2009-07 | Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
GAO | 2009-09-24 | Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2009-09 | Information Security: Concerted Effort Needed to Improve Federal Performance Measures | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-06-03 | Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
GAO | 2008-07-31 | Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability | Government Report | 5.3 Government Organizations | No |
GAO | 2004-05-28 | Technology Assessment: Cybersecurity for Critical Infrastructure Protection | Government Report | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.7 Technology |
No |
GAO | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
GAO | 2012-01-13 | Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
Fischer, Eric A. CRS |
2012-04-23 | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability |
No |
Kerr, Paul K. et al. CRS |
2010-12-09 | The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | Government Report | 3.3 Security Targets, 4.12 Cyberwar, 5.4 International Law (including Laws of War) |
No |
Wilson, Clay CRS |
2007-03-20 | Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues | Government Report | 3.3 Security Targets, 4.12 Cyberwar |
No |
Department of Energy | 2012-04 | The Department's Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
Department of Justice | 2011-04 | The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat | Government Report | 4.6 Information Sharing/Disclosure, 4.11 Cybercrime, 5.3 Government Organizations |
No |
DHS | 2010-08 | DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
DHS | 2007-06 | Challenges Remain in Securing the Nation’s Cyber Infrastructure | Government Report | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-26 | Iranian Cyber Threat to U.S. Homeland | Government Hearing | 3.2.1 States, 3.3 Security Targets, 4.12 Cyberwar |
No |
U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management) | 2012-04-24 | America is Under Cyber Attack: Why Urgent Action is Needed | Government Hearing | 3.1 The Threat and Skeptics, 3.2 Actors and Incentives |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-19 | The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development | Government Hearing | 4.2.1 Risk Management and Investment, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-28 | Cybersecurity:Threats to Communications Networks and Public-Sector Responses | Government Hearing | 3.3.3 Communications, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-03-27 | IT Supply Chain Security: Review of Government and Industry Efforts | Government Hearing | 4.3 Supply Chain Issues | No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2012-03-20 | Fiscal 2013 Defense Authorization: IT and Cyber Operations | Government Hearing | 4.2.1 Risk Management and Investment, Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-07 | Cybersecurity:Networks The Pivotal Role of Communications | Government Hearing | 3.3.3 Communications, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight) | 2012-02-29 | NASA Cybersecurity: An Examination of the Agency’s Information Security | Government Hearing | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-02-28 | Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-12-06 | Hearing on Draft Legislative Proposal on Cybersecurity | Government Hearing | 3.1 The Threat and Skeptics, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology) | 2011-12-01 | Cyber Security: Protecting Your Small Business | Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary | 2011-11-16 | Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act) | Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security) | 2011-11-15 | Cybersecurity: Protecting America’s New Frontier | Government Hearing | 4.10 Privacy, 4.11 Cybercrime |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-11-03 | Institutionalizing Irregular Warfare Capabilities | Government Hearing | 4.12 Cyberwar | No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology) | 2011-10-06 | Cloud Computing: What are the Security Implications? | Government Hearing | 3.3.3.3 Cloud Computing, 4.13 Espionage, 5.3 Government Organizations |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-10-04 | Cyber Threats and Ongoing Efforts to Protect the Nation | Government Hearing | 4.7 Public-Private Cooperation, 4.13.2 Industrial Espionage, 5.4 International Cooperation |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation) | 2011-09-21 | The Cloud Computing Outlook | Government Hearing | 3.3.3.3 Cloud Computing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit) | 2011-09-14 | Combating Cybercriminals | Government Hearing | 3.3.1.1 Government Networks (.gov), 3.3.2.2 Financial Institutions and Networks, 5.7 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2011-07-26 | Cybersecurity: Infrastructure An Overview of Risks to Critical | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Oversight and Government Reform | 2011-07-07 | Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat | Government Hearing | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Financial Services (field hearing in Hoover, AL) | 2011-06-29 | Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information | Government Hearing | 3.3.2.2 Financial Institutions and Networks, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-06-24 | Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal | Government Hearing | 3.3.1.1 Government Networks (.gov), 4.9 Identity Management, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade) | 2011-06-02 | Sony and Epsilon: Lessons for Data Security Legislation | Government Hearing | 4.9 Identity Management, 5.1 Regulation/Liability, 5.2 Private Efforts/Organizations |
No |
U.S. House Committee on Energy and Commerce | 2011-05-31 | Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies) | 2011-05-26 | Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296 Potential to Promote Technology and Combat Terrorism] | Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education) | 2011-05-25 | Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts | Government Hearing | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet) | 2011-05-25 | Cybersecurity: Problems Innovative Solutions to Challenging | Government Hearing | 4.7 Public-Private Cooperation, 4.11 Cybercrime, 5.2 Private Efforts/Organizations |
No |
U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations) | 2011-05-25 | Cybersecurity: Assessing the Immediate Threat to the United States | Government Hearing | 3.1 The Threat and Skeptics, 3.3.1 Public Critical Infrastructure, 4.7 Public-Private Cooperation |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-04-15 | DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure | Government Hearing | 3.3.2 Private Critical Infrastructure, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations) | 2011-04-15 | Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology | Government Hearing | 3.2.1 Governments, 4.12 Cyberwar, 4.13 Espionage |
No |
U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power) | 2011-03-31 | Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs | Government Hearing | 4.2 Economics of Cybersecurity, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-03-16 | Examining the Cyber Threat to Critical Infrastructure and the American Economy | Government Hearing | 3.1 The Threat and Skeptics, 3.3 Security Targets, 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-03-16 | 2012 Budget Request from U.S. Cyber Command | Government Hearing | 3.3.1.2 Military Networks (.mil), 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-02-11 | What Should the Department of Defense’s Role in Cyber Be? | Government Hearing | 3.1 The Threat and Skeptics, 4.12 Cyberwar, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-02-11 | Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities | Government Hearing | 3.3.2 Private Critical Infrastructure, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-02-10 | World Wide Threats | Government Hearing | 3.1 The Threat and Skeptics, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2012-02-01 | Consideration and Markup of H.R. 3674 | Government Hearing | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-12-01 | Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011 | Government Hearing | 4.6 Information Sharing, 5.1 Regulation/Liability |
No |
U.S. House Committee on Science, Space and Technology | 2011-07-21 | Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011 | Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing) | 2011-06-15 | Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach | Government Hearing | 4.6 Information Sharing/Disclosure, 4.10 Privacy, 5.1 Regulation/Liability |
No |