Template:Filtered Table

From Cybersecurity Wiki
Revision as of 18:22, 20 June 2012 by Gili (talk | contribs)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Filtering for type: All Types

Author/Agency Date Title Type Category Synopsis
White House 2009 Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Government Report 1. Overview,
4.7 Public-Private Cooperation
No
White House 2011-04 National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Government Report 4.7 Public-Private Cooperation,
4.9 Identity Management
No
White House 2011-05 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World Government Report 1. Overview No
NSTC 2011-12 Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Government Report 5.3 Government Organizations No
White House 2012-01 National Strategy for Global Supply Chain Security Government Report 4.3 Supply Chain Issues No
White House 2012-02 Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy Government Report 4.10 Privacy,
5.1 Regulation/Liability
No
Kundra, Vivek 2011-02-08 Federal Cloud Computing Strategy Government Report 3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing,
5.3 Government Organizations
No
Kundra, Vivek 2010-12-09 25 Point Implementation Plan to Reform Federal Information Technology Management Government Report 3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing,
5.3 Government Organizations
No
PCAST 2010-12 Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology Government Report 4.3 Supply Chain Issues,
4.10 Privacy,
5.3 Government Organizations
No
PCAST 2011-06 Report to the President on Ensuring American Leadership in Advanced Manufacturing Government Report 4.2.1 Risk Management and Investment,
5.3 Government Organizations
No
DHS 2009-11 A Roadmap for Cybersecurity Research Government Report 1. Overview,
4.2.1 Risk management and Investment
No
DHS 2009-09-16 National Cyber Leap Year Summit 2009: Co-Chairs' Report Government Report 3.3 Security Targets,
4.2 Economics of Cybersecurity,
4.8 Attribution
No
DHS 2010-09 National Cyber Incident Response Plan Government Report 3. Threats and Actors,
5.3 Government Organizations
No
Department of Commerce, Internet Policy Task Force 2011-06 Cybersecurity, Innovation and the Internet Economy Government Report 4.2 Economics of Cybersecurity,
4.7 Public-Private Cooperation
No
DOD 2011-07-14 Department of Defense Strategy for Operating in Cyberspace Government Report No
DHS 2011-11 Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Government Report 3.3 Security Targets,
5.3 Government Organizations
No
National Initiative for Cybersecurity Education 2011-08-11 National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation Government Report 1. Overview,
5.3 Government Organizations
No
Energy Sector Control Systems Working Group 2011-09 Roadmap to Achieve Energy Delivery Systems Cybersecurity Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation
No
GAO 2011-07-25 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities Government Report No
GAO 2011-11-29 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination Government Report No
GAO 2011-07-26 Continued Attention Needed to Protect Our Nation’s Critical Infrastructure Government Report No
GAO 2011-10-03 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements Government Report No
GAO 2010-10-06 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed Government Report No
GAO 2010-06-16 Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats Government Report No
GAO 2009-07 Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
GAO 2009-09-24 Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment Government Report 3.3.1 Public Critical Infrastructure,
5.3 Government Organizations
No
GAO 2009-09 Information Security: Concerted Effort Needed to Improve Federal Performance Measures Government Report 3.3.1 Public Critical Infrastructure,
5.3 Government Organizations
No
GAO 2010-06-03 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development Government Report 4.7 Public-Private Cooperation,
5.3 Government Organizations
No
GAO 2008-07-31 Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability Government Report 5.3 Government Organizations No
GAO 2004-05-28 Technology Assessment: Cybersecurity for Critical Infrastructure Protection Government Report 3.3 Security Targets,
4.7 Public-Private Cooperation,
5.7 Technology
No
GAO 2010-07-15 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed Government Report 3.3.1.2 Military Networks (.mil),
4.7 Public-Private Cooperation
No
GAO 2012-01-13 Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements Government Report 3.3.1.2 Military Networks (.mil),
4.7 Public-Private Cooperation
No
Fischer, Eric A.
CRS
2012-04-23 Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Government Report 3.3 Security Targets,
5.1 Regulation/Liability
No
Kerr, Paul K. et al.
CRS
2010-12-09 The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Government Report 3.3 Security Targets,
4.12 Cyberwar,
5.4 International Law (including Laws of War)
No
Wilson, Clay
CRS
2007-03-20 Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues Government Report 3.3 Security Targets,
4.12 Cyberwar
No
Department of Energy 2012-04 The Department's Management of the Smart Grid Investment Grant Program Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.2.1 Risk Management and Investment
No
Department of Justice 2011-04 The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat Government Report 4.6 Information Sharing/Disclosure,
4.11 Cybercrime,
5.3 Government Organizations
No
DHS 2010-08 DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
DHS 2007-06 Challenges Remain in Securing the Nation’s Cyber Infrastructure Government Report 4.6 Information Sharing,
4.7 Public-Private Cooperation,
5.3 Government Organizations
No