Template:Filtered Table
Jump to navigation
Jump to search
Filtering for type: All Types
Author/Agency | Date | Title | Type | Category | Synopsis |
---|---|---|---|---|---|
White House | 2009 | Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure | Government Report | 1. Overview, 4.7 Public-Private Cooperation |
No |
White House | 2011-04 | National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management |
No |
White House | 2011-05 | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Government Report | 1. Overview | No |
NSTC | 2011-12 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations | No |
White House | 2012-01 | National Strategy for Global Supply Chain Security | Government Report | 4.3 Supply Chain Issues | No |
White House | 2012-02 | Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy | Government Report | 4.10 Privacy, 5.1 Regulation/Liability |
No |
Kundra, Vivek | 2011-02-08 | Federal Cloud Computing Strategy | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Kundra, Vivek | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
PCAST | 2010-12 | Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology | Government Report | 4.3 Supply Chain Issues, 4.10 Privacy, 5.3 Government Organizations |
No |
PCAST | 2011-06 | Report to the President on Ensuring American Leadership in Advanced Manufacturing | Government Report | 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
No |
DHS | 2009-11 | A Roadmap for Cybersecurity Research | Government Report | 1. Overview, 4.2.1 Risk management and Investment |
No |
DHS | 2009-09-16 | National Cyber Leap Year Summit 2009: Co-Chairs' Report | Government Report | 3.3 Security Targets, 4.2 Economics of Cybersecurity, 4.8 Attribution |
No |
DHS | 2010-09 | National Cyber Incident Response Plan | Government Report | 3. Threats and Actors, 5.3 Government Organizations |
No |
Department of Commerce, Internet Policy Task Force | 2011-06 | Cybersecurity, Innovation and the Internet Economy | Government Report | 4.2 Economics of Cybersecurity, 4.7 Public-Private Cooperation |
No |
DOD | 2011-07-14 | Department of Defense Strategy for Operating in Cyberspace | Government Report | No | |
DHS | 2011-11 | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
No |
National Initiative for Cybersecurity Education | 2011-08-11 | National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation | Government Report | 1. Overview, 5.3 Government Organizations |
No |
Energy Sector Control Systems Working Group | 2011-09 | Roadmap to Achieve Energy Delivery Systems Cybersecurity | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
GAO | 2011-07-25 | Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities | Government Report | No | |
GAO | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination | Government Report | No | |
GAO | 2011-07-26 | Continued Attention Needed to Protect Our Nation’s Critical Infrastructure | Government Report | No | |
GAO | 2011-10-03 | Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements | Government Report | No | |
GAO | 2010-10-06 | Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed | Government Report | No | |
GAO | 2010-06-16 | Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | No | |
GAO | 2009-07 | Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
GAO | 2009-09-24 | Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2009-09 | Information Security: Concerted Effort Needed to Improve Federal Performance Measures | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-06-03 | Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
GAO | 2008-07-31 | Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability | Government Report | 5.3 Government Organizations | No |
GAO | 2004-05-28 | Technology Assessment: Cybersecurity for Critical Infrastructure Protection | Government Report | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.7 Technology |
No |
GAO | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
GAO | 2012-01-13 | Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
Fischer, Eric A. CRS |
2012-04-23 | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability |
No |
Kerr, Paul K. et al. CRS |
2010-12-09 | The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | Government Report | 3.3 Security Targets, 4.12 Cyberwar, 5.4 International Law (including Laws of War) |
No |
Wilson, Clay CRS |
2007-03-20 | Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues | Government Report | 3.3 Security Targets, 4.12 Cyberwar |
No |
Department of Energy | 2012-04 | The Department's Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
Department of Justice | 2011-04 | The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat | Government Report | 4.6 Information Sharing/Disclosure, 4.11 Cybercrime, 5.3 Government Organizations |
No |
DHS | 2010-08 | DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
DHS | 2007-06 | Challenges Remain in Securing the Nation’s Cyber Infrastructure | Government Report | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-26 | Iranian Cyber Threat to U.S. Homeland | Government Hearing | 3.2.1 States, 3.3 Security Targets, 4.12 Cyberwar |
No |
U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management) | 2012-04-24 | America is Under Cyber Attack: Why Urgent Action is Needed | Government Hearing | 3.1 The Threat and Skeptics, 3.2 Actors and Incentives |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-19 | The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development | Government Hearing | 4.2.1 Risk Management and Investment, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-28 | Cybersecurity:Threats to Communications Networks and Public-Sector Responses | Government Hearing | 3.3.3 Communications, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-03-27 | IT Supply Chain Security: Review of Government and Industry Efforts | Government Hearing | 4.3 Supply Chain Issues | No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2012-03-20 | Fiscal 2013 Defense Authorization: IT and Cyber Operations | Government Hearing | 4.2.1 Risk Management and Investment, Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-07 | Cybersecurity:Networks The Pivotal Role of Communications | Government Hearing | 3.3.3 Communications, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight) | 2012-02-29 | NASA Cybersecurity: An Examination of the Agency’s Information Security | Government Hearing | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-02-28 | Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-12-06 | Hearing on Draft Legislative Proposal on Cybersecurity | Government Hearing | 3.1 The Threat and Skeptics, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology) | 2011-12-01 | Cyber Security: Protecting Your Small Business | Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary | 2011-11-16 | Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act) | Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security) | 2011-11-15 | Cybersecurity: Protecting America’s New Frontier | Government Hearing | 4.10 Privacy, 4.11 Cybercrime |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-11-03 | Institutionalizing Irregular Warfare Capabilities | Government Hearing | 4.12 Cyberwar | No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology) | 2011-10-06 | Cloud Computing: What are the Security Implications? | Government Hearing | 3.3.3.3 Cloud Computing, 4.13 Espionage, 5.3 Government Organizations |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-10-04 | Cyber Threats and Ongoing Efforts to Protect the Nation | Government Hearing | 4.7 Public-Private Cooperation, 4.13.2 Industrial Espionage, 5.4 International Cooperation |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation) | 2011-09-21 | The Cloud Computing Outlook | Government Hearing | 3.3.3.3 Cloud Computing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit) | 2011-09-14 | Combating Cybercriminals | Government Hearing | 3.3.1.1 Government Networks (.gov), 3.3.2.2 Financial Institutions and Networks, 5.7 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2011-07-26 | Cybersecurity: Infrastructure An Overview of Risks to Critical | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Oversight and Government Reform | 2011-07-07 | Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat | Government Hearing | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Financial Services (field hearing in Hoover, AL) | 2011-06-29 | Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information | Government Hearing | 3.3.2.2 Financial Institutions and Networks, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-06-24 | Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal | Government Hearing | 3.3.1.1 Government Networks (.gov), 4.9 Identity Management, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade) | 2011-06-02 | Sony and Epsilon: Lessons for Data Security Legislation | Government Hearing | 4.9 Identity Management, 5.1 Regulation/Liability, 5.2 Private Efforts/Organizations |
No |
U.S. House Committee on Energy and Commerce | 2011-05-31 | Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act | Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies) | 2011-05-26 | Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296 Potential to Promote Technology and Combat Terrorism] | Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education) | 2011-05-25 | Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts | Government Hearing | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet) | 2011-05-25 | Cybersecurity: Problems Innovative Solutions to Challenging | Government Hearing | 4.7 Public-Private Cooperation, 4.11 Cybercrime, 5.2 Private Efforts/Organizations |
No |
U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations) | 2011-05-25 | Cybersecurity: Assessing the Immediate Threat to the United States | Government Hearing | 3.1 The Threat and Skeptics, 3.3.1 Public Critical Infrastructure, 4.7 Public-Private Cooperation |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-04-15 | DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure | Government Hearing | 3.3.2 Private Critical Infrastructure, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations) | 2011-04-15 | Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology | Government Hearing | 3.2.1 Governments, 4.12 Cyberwar, 4.13 Espionage |
No |
U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power) | 2011-03-31 | Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs | Government Hearing | 4.2 Economics of Cybersecurity, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-03-16 | Examining the Cyber Threat to Critical Infrastructure and the American Economy | Government Hearing | 3.1 The Threat and Skeptics, 3.3 Security Targets, 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-03-16 | 2012 Budget Request from U.S. Cyber Command | Government Hearing | 3.3.1.2 Military Networks (.mil), 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-02-11 | What Should the Department of Defense’s Role in Cyber Be? | Government Hearing | 3.1 The Threat and Skeptics, 4.12 Cyberwar, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-02-11 | Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities | Government Hearing | 3.3.2 Private Critical Infrastructure, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-02-10 | World Wide Threats | Government Hearing | 3.1 The Threat and Skeptics, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2012-02-01 | Consideration and Markup of H.R. 3674 | Government Hearing | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-12-01 | Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011 | Government Hearing | 4.6 Information Sharing, 5.1 Regulation/Liability |
No |
U.S. House Committee on Science, Space and Technology | 2011-07-21 | Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011 | Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing) | 2011-06-15 | Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach | Government Hearing | 4.6 Information Sharing/Disclosure, 4.10 Privacy, 5.1 Regulation/Liability |
No |