Author/Agency
|
Date
|
Title
|
Type
|
Category
|
McAfee and the Security Defense Agenda |
2012-02-12 |
""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"" |
|
|
Business Roundtable |
2012-10-11 |
""Mission Critical: A Public-Private Strategy for Effective Cybersecurity "" |
|
|
Centre for Secure Information Technologies |
2012-09-11 |
""World Cybersecurity Technology Research Summit (Belfast 2011) "" |
|
|
National Security Cyberspace Institute |
2012-07-11 |
Analogies Whitepaper-K McKee.pdf ""A Review of Frequently Used Cyber Analogies "" |
|
|
Center for a New American Security |
2012-06-11 |
""America’s Cyber Future: Security and Prosperity in the Information Age "" |
|
|
European Network and Information Security Agency (ENISA) |
2011-04-11 |
""Resilience of the Internet Interconnection Ecosystem, at: "" |
|
|
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America |
2011-03-08 |
""Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "" |
|
|
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies |
2011-01 |
""Cybersecurity Two Years Later "" |
|
|
National Research Council |
2010-09-21 |
""Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "" |
|
|
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum |
2009-09-15 |
""National Security Threats in Cyberspace "" |
|
|
GAO |
2012-02-28 |
""Cybersecurity: Challenges to Securing the Modernized Electricity Grid "" |
Government Report |
|
GAO |
2011-12-09 |
""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" |
Government Report |
|
GAO |
2011-11-29 |
""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: "" |
Government Report |
|
GAO |
2011-10-17 |
""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" |
Government Report |
|
GAO |
2011-10-05 |
""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" |
Government Report |
|
GAO |
2011-10-03 |
""Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements "" |
Government Report |
|
GAO |
2011-10-17 |
""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" |
Government Report |
|
GAO |
2011-07-29 |
""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates "" |
Government Report |
|
GAO |
2011-07-26 |
""Continued Attention Needed to Protect Our Nation’s Critical Infrastructure "" |
Government Report |
|
GAO |
2011-07-25 |
""Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities "" |
Government Report |
|
GAO |
2010-08-16 |
""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "" |
Government Report |
|
GAO |
2011-07-08 |
""Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain "" |
Government Report |
|
GAO |
2011-03-16 |
""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "" |
Government Report |
|
GAO |
2011-01-12 |
""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "" |
Government Report |
|
GAO |
2010-11-30 |
""Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk "" |
Government Report |
|
GAO |
2010-10-06 |
""Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed "" |
Government Report |
|
GAO |
2010-09-23 |
""DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened "" |
Government Report |
|
GAO |
2010-09-15 |
""Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems "" |
Government Report |
|
GAO |
2010-08-02 |
""United States Faces Challenges in Addressing Global Cybersecurity and Governance "" |
Government Report |
|
GAO |
2010-07-01 |
""Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing "" |
Government Report |
|
GAO |
2010-06-16 |
""Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" |
Government Report |
|
GAO |
2010-03-24 |
""Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: "" |
Government Report |
|
GAO |
2010-03-16 |
""Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" |
Government Report |
|
GAO |
2010-04-12 |
""Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies "" |
Government Report |
|
GAO |
2010-03-05 |
""Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative "" |
Government Report |
|
GAO |
2009-11-17 |
""Continued Efforts Are Needed to Protect Information Systems from Evolving Threats "" |
Government Report |
|
GAO |
2003-08-27 |
""Efforts to Improve Information sharing Need to Be Strengthened "" |
Government Report |
|
White House/OMB |
2011-12-06 |
""Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program "" |
Government Report |
|
White House/OMB |
2011-10-07 |
""Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information "" |
Government Report |
|
White House/OMB |
2011-09-14 |
""FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa "" |
Government Report |
|
White House/OMB |
2011-05-16 |
""International Strategy for Cyberspace "" |
Government Report |
|
White House/OMB |
2011-05-12 |
""Cybersecurity Legislative Proposal (Fact Sheet) "" |
Government Report |
|
White House/OMB |
2011-02-13 |
""Federal Cloud Computing Strategy "" |
Government Report |
|
White House/OMB |
2010-12-09 |
""25 Point Implementation Plan to Reform Federal Information Technology Management "" |
Government Report |
|
White House/OMB |
2010-07-06 |
""Clarifying Cybersecurity Responsibilities "" |
Government Report |
|
White House/OMB |
2010-06-25 |
""The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy "" |
Government Report |
|
White House/OMB |
2010-03-02 |
""Comprehensive National Cybersecurity Initiative (CNCI) "" |
Government Report |
|
White House/OMB |
2009-05-29 |
""Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure "" |
Government Report |
|
DOD |
2012-02-16 |
""DOD Information Security Program: Overview, Classification, and Declassification "" |
Government Report |
|
General Accountability Office (GAO) |
2011-07-29 |
""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates "" |
Government Report |
|
Secretary of the Air Force |
2011-07-27 |
""Legal Reviews of Weapons and Cyber Capabilities "" |
Government Report |
|
DOD |
2011-07-14 |
""Department of Defense Strategy for Operating in Cyberspace "" |
Government Report |
|
DOD |
2011-04 |
""Cyber Operations Personnel Report (DOD) "" |
Government Report |
|
National Research Council, Committee for Advancing Software-Intensive Systems Producibility |
2010-10-20 |
""Critical Code: Software Producibility for Defense "" |
Government Report |
|
U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) |
2010-009 |
""Defending a New Domain "" |
Government Report |
|
Quadrennial Defense Review |
2010-07-30 |
""The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) "" |
Government Report |
|
U.S. Air Force |
2010-07-15 |
""Cyberspace Operations: Air Force Doctrine Document 3-12 "" |
Government Report |
|
U.S. Navy |
2010-06-17 |
""DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance "" |
Government Report |
|
NIST |
2012-02-17 |
""Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" |
Government Report |
|
Department of Commerce |
2011-06-14 |
""Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" |
Government Report |
|
White House |
2011-04-15 |
""Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace "" |
Government Report |
|
White House |
2011-04-15 |
""National Strategy for Trusted Identities in Cyberspace "" |
Government Report |
|
Business Software Alliance |
2012-02-02 |
""Global Cloud Computing Scorecard a Blueprint for Economic Opportunity "" |
|
|
General Services Administration (GSA) |
2012-02-07 |
""Concept of Operations: FedRAMP "" |
Government Report |
|
Federal CIO Council |
2012-01-04 |
""Federal Risk and Authorization Management Program (FedRAMP) "" |
Government Report |
|
White House/Office of Management and Budget (OMB) |
2011-12-08 |
""Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) "" |
Government Report |
|
NIST |
2011-12-01 |
""U.S. Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft). High-Priority Requirements to Further USG Agency Cloud Computing Adoption "" |
Government Report |
|
NIST |
2011-12-01 |
""U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters "" |
Government Report |
|
GAO |
2011-10-05 |
""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" |
Government Report |
|
NIST |
2011-09-01 |
""Cloud Computing Reference Architecture "" |
Government Report |
|
Software and Information Industry Association (SAII) |
2011-07-26 |
""Guide to Cloud Computing for Policy Makers "" |
Government Report |
|
White House |
2011-02-13 |
""Federal Cloud Computing Strategy "" |
Government Report |
|
Department of Energy, Office of Electricity Delivery & Energy Reliability |
1899-12-30 |
""Cybersecurity for Energy Delivery Systems Program "" |
Government Report |
|
Organization for Economic Co-operation and Development (OECD) |
2012-01-10 |
""ICT Applications for the Smart Grid: Opportunities and Policy Implications "" |
Government Report |
|
Department of Energy (DOE) Inspector General |
2012-01-01 |
""The Department’s Management of the Smart Grid Investment Grant Program "" |
Government Report |
|
General Accountability Office (GAO) |
2011-12-09 |
""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" |
Government Report |
|
Massachusetts Institute of Technology (MIT) |
2011-12-05 |
""The Future of the Electric Grid "" |
Independent Report |
|
Federal Communications Commission (FCC) |
2011-06-03 |
db0610/DOC-307454A1.txt ""FCC's Plan for Ensuring the Security of Telecommunications Networks"" |
|
|
U.S. Army War College |
2011-05-09 |
""Cyber Infrastructure Protection "" |
|
|
McAfee and Center for Strategic and International Studies (CSIS) |
2011-04-21 |
""In the Dark: Crucial Industries Confront Cyberattacks "" |
|
|
General Accountability Office (GAO) |
2011-03-16 |
""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "" |
|
|
North American Electric Reliability Corp. (NERC) |
2011-01-26 |
""Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security "" |
|
|
General Accountability Office (GAO) |
2011-01-12 |
""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "" |
|
|
White House (Office of Science & Technology Policy) |
2010-12-06 |
""Partnership for Cybersecurity Innovation "" |
|
|
International Instrument Users Association (WIB) |
2010-11-10 |
""WIB Security Standard Released "" |
|
|
Microsoft |
2012-11-10 |
""Information Security Management System for Microsoft Cloud Infrastructure "" |
|
|
National Institute of Standards and Technology (NIST) |
2010-09-02 |
""NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines "" |
|
|
General Accountability Office (GAO) |
2010-07-15 |
""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "" |
|
|
Pew Research Center’s Internet & American Life Project |
2010-06-11 |
""The future of cloud computing "" |
|
|
IEEE/EastWest Institute |
2010-05-26 |
""The Reliability of Global Undersea Communications Cable Infrastructure (The ROGUCCI Report) "" |
|
|
Department of Energy, Idaho National Laboratory |
2010-05-01 |
""NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses "" |
|
|
Federal Communications Commission (FCC) |
2010-04-21 |
""Explore the reliability and resiliency of commercial broadband communications networks "" |
|
|
Cloud Security Alliance |
2012-12-09 |
""Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 "" |
Independent Report |
|
U.S. Department of Energy, Infrastructure Security and Energy Restoration |
2007-01-01 |
""21 Steps to Improve Cyber Security of SCADA Networks "" |
|
|
National Association of Secretaries of State |
2012-01-12 |
""Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices "" |
|
|
RAND |
2011-12-21 |
""A Cyberworm that Knows No Boundaries "" |
|
|
DOD |
2011-11-15 |
""Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 "" |
|
|
Symantec |
2011-10-24 |
""W32.Duqu: The Precursor to the Next Stuxnet "" |
|
|
Journal of Strategic Studies |
2011-10-05 |
""Cyber War Will Not Take Place "" |
|
|
McAfee |
2011-08-02 |
""Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years "" |
Industry Report |
|
Threat Level Blog (Wired) |
2010-12-27 |
""A Four-Day Dive Into Stuxnet’s Heart "" |
Independent Report |
|
Institute for Science and International Security |
2010-12-22 |
""Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment "" |
|
|
Organisation for Economic Co-operation and Development (OECD) |
2010-11-12 |
""The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data "" |
|
|
European Network and Information Security Agency |
2010-10-07 |
""Stuxnet Analysis "" |
|
|
National Research Council |
2010-10-05 |
""Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy "" |
|
|
Council on Foreign Relations |
2010-07-15 |
""Untangling Attribution: Moving to Accountability in Cyberspace [Testimony ""] |
|
|
McAfee |
2012-02-01 |
""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World "" |
industry Report |
|
Booz Allen Hamilton and the Economist Intelligence Unit |
2012-01-15 |
""Cyber Power Index "" |
Industry Report |
|
Office of the National Counterintelligence Executive |
2011-11-03 |
""Foreign Spies Stealing US Economic Secrets in Cyberspace "" |
Government Report |
|
Cabinet Office (United Kingdom) |
2012-11-11 |
""The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world "" |
Non-US Government Report |
|
Cyber Security Forum Initiative |
2011-05-09 |
""Cyber Dawn: Libya "" |
|
|
U.S. Army War College, Strategy Research Project |
2011-03-24 |
""China’s Cyber Power and America’s National Security "" |
Government Report |
|
James Clapper, Director of National Intelligence |
2011-02-10 |
""Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) "" |
Government Report |
|
EastWest Institute |
2011-02-03 |
""Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace "" |
|
|
IEEE/EastWest Institute |
2010-05-26 |
""The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) "" |
|
|
International Telecommunications Union |
2012-02-10 |
""ITU Toolkit for Cybercrime Legislation "" |
|
|
General Accountability Office (GAO) |
2011-11-29 |
""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination "" |
Government Report |
|
National Initiative for Cybersecurity Education (NICE) |
2011-11-21 |
""NICE Cybersecurity Workforce Framework "" |
|
|
National Cyber Security Alliance and Microsoft |
2011-05-13 |
""2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey "" |
|
|
Department of Defense |
2012-04-11 |
""Cyber Operations Personnel Report (DoD) "" |
Government Report |
|
University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research |
2011-01-13 |
""Design of the DETER Security Testbed "" |
Independent Report |
|
Project on National Security Reform (PNSR) |
2012-11-10 |
""The Power of People: Building an Integrated National Security Professional System for the 21st Century "" |
|
|
National Science Foundation (NSF) |
2012-01-17 |
""Information Security Risk Taking "" |
|
|
NSF |
2011-08-11 |
""At the Forefront of Cyber Security Research "" |
|
|
White House |
2010-12-16 |
""Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology "" |
Government Report |
|
White House Office of Science and Technology Policy |
2010-12-06 |
""Partnership for Cybersecurity Innovation "" |
Government Report |
|
Mitre Corp (JASON Program Office) |
2012-11-10 |
""Science of Cyber-Security "" |
|
|
National Security Initiative |
2010-10-18 |
""American Security Challenge "" |
|
|