Template:Filtered Table
Jump to navigation
Jump to search
Filtering for type: All Types
Author/Agency | Date | Title | Type | Category | Synopsis |
White House | 2009 | Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure | Government Report | 1. Overview, 4.7 Public-Private Cooperation |
No |
White House | 2011-04 | National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management |
No |
White House | 2011-05 | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Government Report | 1. Overview | No |
NSTC | 2011-12 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations | No |
White House | 2012-01 | National Strategy for Global Supply Chain Security | Government Report | 4.3 Supply Chain Issues | No |
White House | 2012-02 | Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy | Government Report | 4.10 Privacy, 5.1 Regulation/Liability |
No |
Kundra, Vivek | 2011-02-08 | Federal Cloud Computing Strategy | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Kundra, Vivek | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
PCAST | 2010-12 | Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology | Government Report | 4.3 Supply Chain Issues, 4.10 Privacy, 5.3 Government Organizations |
No |
PCAST | 2011-06 | Report to the President on Ensuring American Leadership in Advanced Manufacturing | Government Report | 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
No |
DHS | 2009-11 | A Roadmap for Cybersecurity Research | Government Report | 1. Overview, 4.2.1 Risk management and Investment |
No |
DHS | 2009-09-16 | National Cyber Leap Year Summit 2009: Co-Chairs' Report | Government Report | 3.3 Security Targets, 4.2 Economics of Cybersecurity, 4.8 Attribution |
No |
DHS | 2010-09 | National Cyber Incident Response Plan | Government Report | 3. Threats and Actors, 5.3 Government Organizations |
No |
Department of Commerce, Internet Policy Task Force | 2011-06 | Cybersecurity, Innovation and the Internet Economy | Government Report | 4.2 Economics of Cybersecurity, 4.7 Public-Private Cooperation |
No |
DOD | 2011-07-14 | Department of Defense Strategy for Operating in Cyberspace | Government Report | No | |
DHS | 2011-11 | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
No |
National Initiative for Cybersecurity Education | 2011-08-11 | National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation | Government Report | 1. Overview, 5.3 Government Organizations |
No |
Energy Sector Control Systems Working Group | 2011-09 | Roadmap to Achieve Energy Delivery Systems Cybersecurity | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
GAO | 2011-07-25 | Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities | Government Report | No | |
GAO | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination | Government Report | No | |
GAO | 2011-07-26 | Continued Attention Needed to Protect Our Nation’s Critical Infrastructure | Government Report | No | |
GAO | 2011-10-03 | Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements | Government Report | No | |
GAO | 2010-10-06 | Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed | Government Report | No | |
GAO | 2010-06-16 | Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | No | |
GAO | 2009-07 | Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
GAO | 2009-09-24 | Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2009-09 | Information Security: Concerted Effort Needed to Improve Federal Performance Measures | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-06-03 | Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
GAO | 2008-07-31 | Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability | Government Report | 5.3 Government Organizations | No |
GAO | 2004-05-28 | Technology Assessment: Cybersecurity for Critical Infrastructure Protection | Government Report | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.7 Technology |
No |
GAO | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
GAO | 2012-01-13 | Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
Fischer, Eric A. CRS |
2012-04-23 | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability |
No |
Kerr, Paul K. et al. CRS |
2010-12-09 | The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | Government Report | 3.3 Security Targets, 4.12 Cyberwar, 5.4 International Law (including Laws of War) |
No |
Wilson, Clay CRS |
2007-03-20 | Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues | Government Report | 3.3 Security Targets, 4.12 Cyberwar |
No |
Department of Energy | 2012-04 | The Department's Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
Department of Justice | 2011-04 | The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat | Government Report | 4.6 Information Sharing/Disclosure, 4.11 Cybercrime, 5.3 Government Organizations |
No |
DHS | 2010-08 | DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
DHS | 2007-06 | Challenges Remain in Securing the Nation’s Cyber Infrastructure | Government Report | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |