Template:Filtered Table

From Cybersecurity Wiki
Revision as of 17:51, 20 June 2012 by Gili (talk | contribs)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Filtering for type: All Types

Author/Agency Date Title Type Category Synopsis
White House 2009 Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Government Report 1. Overview,
4.7 Public-Private Cooperation
No
White House 2011-04 National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Government Report 4.9 Identity Management,
4.7 Public-Private Cooperation
No
White House 2011-05 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World Government Report 1. Overview No
NSTC 2011-12 Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Government Report 5.3 Government Organizations No
White House 2012-01 National Strategy for Global Supply Chain Security Government Report 4.3 Supply Chain Issues No
White House 2012-02 Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy Government Report 4.10 Privacy,
5.1 Regulation/Liability
No
Kundra, Vivek 2011-02-08 Federal Cloud Computing Strategy Government Report 3.3.3.3 Cloud Computing,
3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
Kundra, Vivek 2010-12-09 25 Point Implementation Plan to Reform Federal Information Technology Management Government Report 5.3 Government Organizations,
3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing
No
PCAST 2010-12 Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology Government Report 5.3 Government Organizations,
4.10 Privacy,
4.3 Supply Chain Issues
No
PCAST 2011-06 Report to the President on Ensuring American Leadership in Advanced Manufacturing Government Report 5.3 Government Organizations,
4.2.1 Risk Management and Investment
No
DHS 2009-11 A Roadmap for Cybersecurity Research Government Report 1. Overview,
4.2.1 Risk management and Investment
No
DHS 2009-09-16 National Cyber Leap Year Summit 2009: Co-Chairs' Report Government Report 4.2 Economics of Cybersecurity,
3.3 Security Targets,
4.8 Attribution
No
DHS 2010-09 National Cyber Incident Response Plan Government Report 5.3 Government Organizations,
3. Threats and Actors
No
Department of Commerce, Internet Policy Task Force 2011-06 Cybersecurity, Innovation and the Internet Economy Government Report 4.7 Public-Private Cooperation,
4.2 Economics of Cybersecurity
No
DOD 2011-07-14 Department of Defense Strategy for Operating in Cyberspace Government Report No
DHS 2011-11 Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Government Report 5.3 Government Organizations,
3.3 Security Targets
No
National Initiative for Cybersecurity Education 2011-08-11 National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation Government Report 1. Overview,
5.3 Government Organizations
No
Energy Sector Control Systems Working Group 2011-09 Roadmap to Achieve Energy Delivery Systems Cybersecurity Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation
No
GAO 2011-07-25 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities Government Report No
GAO 2011-11-29 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination Government Report No
GAO 2011-07-26 Continued Attention Needed to Protect Our Nation’s Critical Infrastructure Government Report No
GAO 2011-10-03 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements Government Report No
GAO 2010-10-06 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed Government Report No
GAO 2010-06-16 Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats Government Report No
GAO 2009-07 Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
GAO 2009-09-24 Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment Government Report 3.3.1 Public Critical Infrastructure,
Government Organizations
No
GAO 2009-09 Information Security: Concerted Effort Needed to Improve Federal Performance Measures Government Report 5.3 Government Organizations,
3.3.1 Public Critical Infrastructure
No
GAO 2010-06-03 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development Government Report 5.3 Government Organizations,
4.7 Public-Private Cooperation
No
GAO 2008-07-31 Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability Government Report 5.3 Government Organizations No
GAO 2004-05-28 Technology Assessment: Cybersecurity for Critical Infrastructure Protection Government Report 5.7 Technology,
3.3 Security Targets,
4.7 Public-Private Cooperation
No
GAO 2010-07-15 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed Government Report 4.7 Public-Private Cooperation,
3.3.1.2 Military Networks (.mil)
No
GAO 2012-01-13 Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements Government Report 4.7 Public-Private Cooperation,
3.3.1.2 Military Networks (.mil)
No
Fischer, Eric A.
CRS
2012-04-23 Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Government Report 5.1 Regulation/Liability,
3.3 Security Targets
No
Kerr, Paul K. et al.
CRS
2010-12-09 The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Government Report 5.4 International Law (including Laws of War),
3.3 Security Targets,
4.12 Cyberwar
No
Wilson, Clay
CRS
2007-03-20 Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues Government Report 4.12 Cyberwar,
3.3 Security Targets
No
Department of Energy 2012-04 The Department's Management of the Smart Grid Investment Grant Program Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.2.1 Risk Management and Investment
No
Department of Justice 2011-04 The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat Government Report 5.3 Government Organizations,
4.11 Cybercrime,
4.6 Information Sharing/Disclosure
No
DHS 2010-08 DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
DHS 2007-06 Challenges Remain in Securing the Nation’s Cyber Infrastructure Government Report 5.3 Government Organizations,
4.7 Public-Private Cooperation,
4.6 Information Sharing
No