Difference between revisions of "Template:Filtered Table"

From Cybersecurity Wiki
Jump to: navigation, search
Line 167: Line 167:
 
|-
 
|-
 
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||Government Hearing||4.6 Information Sharing/Disclosure,<br>4.10 Privacy,<br>5.1 Regulation/Liability||No
 
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||Government Hearing||4.6 Information Sharing/Disclosure,<br>4.10 Privacy,<br>5.1 Regulation/Liability||No
 +
|-
 +
| Graham David E  ||2010||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Threats_and_the_Law_of_War  Cyber Threats and the Law of War]||Journal Article||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes
 +
|-
 +
| Schmitt Michael N  ||2004||[http://cyber.law.harvard.edu/cybersecurity/Direct_Participation_in_Hostilities Direct Participation in Hostilities and 21st Century Armed Conflict]||Journal Article||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes
 
</noinclude>|}
 
</noinclude>|}
 
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
 
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 11:17, 23 July 2012

Filtering for type: All Types

Author/Agency Date Title Type Category Synopsis
White House 2009 Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Government Report 1. Overview,
4.7 Public-Private Cooperation
No
White House 2011-04 National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Government Report 4.7 Public-Private Cooperation,
4.9 Identity Management
No
White House 2011-05 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World Government Report 1. Overview No
NSTC 2011-12 Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Government Report 5.3 Government Organizations No
White House 2012-01 National Strategy for Global Supply Chain Security Government Report 4.3 Supply Chain Issues No
White House 2012-02 Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy Government Report 4.10 Privacy,
5.1 Regulation/Liability
No
Kundra, Vivek 2011-02-08 Federal Cloud Computing Strategy Government Report 3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing,
5.3 Government Organizations
No
Kundra, Vivek 2010-12-09 25 Point Implementation Plan to Reform Federal Information Technology Management Government Report 3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing,
5.3 Government Organizations
No
PCAST 2010-12 Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology Government Report 4.3 Supply Chain Issues,
4.10 Privacy,
5.3 Government Organizations
No
PCAST 2011-06 Report to the President on Ensuring American Leadership in Advanced Manufacturing Government Report 4.2.1 Risk Management and Investment,
5.3 Government Organizations
No
DHS 2009-11 A Roadmap for Cybersecurity Research Government Report 1. Overview,
4.2.1 Risk management and Investment
No
DHS 2009-09-16 National Cyber Leap Year Summit 2009: Co-Chairs' Report Government Report 3.3 Security Targets,
4.2 Economics of Cybersecurity,
4.8 Attribution
No
DHS 2010-09 National Cyber Incident Response Plan Government Report 3. Threats and Actors,
5.3 Government Organizations
No
Department of Commerce, Internet Policy Task Force 2011-06 Cybersecurity, Innovation and the Internet Economy Government Report 4.2 Economics of Cybersecurity,
4.7 Public-Private Cooperation
No
DOD 2011-07-14 Department of Defense Strategy for Operating in Cyberspace Government Report No
DHS 2011-11 Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Government Report 3.3 Security Targets,
5.3 Government Organizations
No
National Initiative for Cybersecurity Education 2011-08-11 National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation Government Report 1. Overview,
5.3 Government Organizations
No
Energy Sector Control Systems Working Group 2011-09 Roadmap to Achieve Energy Delivery Systems Cybersecurity Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation
No
GAO 2011-07-25 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities Government Report No
GAO 2011-11-29 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination Government Report No
GAO 2011-07-26 Continued Attention Needed to Protect Our Nation’s Critical Infrastructure Government Report No
GAO 2011-10-03 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements Government Report No
GAO 2010-10-06 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed Government Report No
GAO 2010-06-16 Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats Government Report No
GAO 2009-07 Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
GAO 2009-09-24 Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment Government Report 3.3.1 Public Critical Infrastructure,
5.3 Government Organizations
No
GAO 2009-09 Information Security: Concerted Effort Needed to Improve Federal Performance Measures Government Report 3.3.1 Public Critical Infrastructure,
5.3 Government Organizations
No
GAO 2010-06-03 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development Government Report 4.7 Public-Private Cooperation,
5.3 Government Organizations
No
GAO 2008-07-31 Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability Government Report 5.3 Government Organizations No
GAO 2004-05-28 Technology Assessment: Cybersecurity for Critical Infrastructure Protection Government Report 3.3 Security Targets,
4.7 Public-Private Cooperation,
5.7 Technology
No
GAO 2010-07-15 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed Government Report 3.3.1.2 Military Networks (.mil),
4.7 Public-Private Cooperation
No
GAO 2012-01-13 Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements Government Report 3.3.1.2 Military Networks (.mil),
4.7 Public-Private Cooperation
No
Fischer, Eric A.
CRS
2012-04-23 Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Government Report 3.3 Security Targets,
5.1 Regulation/Liability
No
Kerr, Paul K. et al.
CRS
2010-12-09 The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Government Report 3.3 Security Targets,
4.12 Cyberwar,
5.4 International Law (including Laws of War)
No
Wilson, Clay
CRS
2007-03-20 Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues Government Report 3.3 Security Targets,
4.12 Cyberwar
No
Department of Energy 2012-04 The Department's Management of the Smart Grid Investment Grant Program Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.2.1 Risk Management and Investment
No
Department of Justice 2011-04 The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat Government Report 4.6 Information Sharing/Disclosure,
4.11 Cybercrime,
5.3 Government Organizations
No
DHS 2010-08 DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
DHS 2007-06 Challenges Remain in Securing the Nation’s Cyber Infrastructure Government Report 4.6 Information Sharing,
4.7 Public-Private Cooperation,
5.3 Government Organizations
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) 2012-04-26 Iranian Cyber Threat to U.S. Homeland Government Hearing 3.2.1 States,
3.3 Security Targets,
4.12 Cyberwar
No
U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management) 2012-04-24 America is Under Cyber Attack: Why Urgent Action is Needed Government Hearing 3.1 The Threat and Skeptics,
3.2 Actors and Incentives
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) 2012-04-19 The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development Government Hearing 4.2.1 Risk Management and Investment,
5.3 Government Organizations,
5.7 Technology
No
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) 2012-03-28 Cybersecurity:Threats to Communications Networks and Public-Sector Responses Government Hearing 3.3.3 Communications,
4.7 Public-Private Cooperation,
5.3 Government Organizations
No
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) 2012-03-27 IT Supply Chain Security: Review of Government and Industry Efforts Government Hearing 4.3 Supply Chain Issues No
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) 2012-03-20 Fiscal 2013 Defense Authorization: IT and Cyber Operations Government Hearing 4.2.1 Risk Management and Investment,
Government Organizations
No
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) 2012-03-07 Cybersecurity:Networks The Pivotal Role of Communications Government Hearing 3.3.3 Communications,
5.3 Government Organizations,
5.7 Technology
No
U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight) 2012-02-29 NASA Cybersecurity: An Examination of the Agency’s Information Security Government Hearing 3.3.1 Public Critical Infrastructure,
5.3 Government Organizations,
5.7 Technology
No
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) 2012-02-28 Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security Government Hearing 3.3.2.1 Electricity, Oil and Natural Gas,
4.2.1 Risk Management and Investment
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2011-12-06 Hearing on Draft Legislative Proposal on Cybersecurity Government Hearing 3.1 The Threat and Skeptics,
4.7 Public-Private Cooperation,
5.1 Regulation/Liability
No
U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology) 2011-12-01 Cyber Security: Protecting Your Small Business Government Hearing 4.2.1 Risk Management and Investment,
5.1 Regulation/Liability
No
U.S. House Committee on the Judiciary 2011-11-16 Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act) Government Hearing 4.11 Cybercrime,
5.1 Regulation/Liability
No
U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security) 2011-11-15 Cybersecurity: Protecting America’s New Frontier Government Hearing 4.10 Privacy,
4.11 Cybercrime
No
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) 2011-11-03 Institutionalizing Irregular Warfare Capabilities Government Hearing 4.12 Cyberwar No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology) 2011-10-06 Cloud Computing: What are the Security Implications? Government Hearing 3.3.3.3 Cloud Computing,
4.13 Espionage,
5.3 Government Organizations
No
U.S. House Permenant Select Committee on Intelligence 2011-10-04 Cyber Threats and Ongoing Efforts to Protect the Nation Government Hearing 4.7 Public-Private Cooperation,
4.13.2 Industrial Espionage,
5.4 International Cooperation
No
U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation) 2011-09-21 The Cloud Computing Outlook Government Hearing 3.3.3.3 Cloud Computing,
4.7 Public-Private Cooperation,
5.1 Regulation/Liability
No
U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit) 2011-09-14 Combating Cybercriminals Government Hearing 3.3.1.1 Government Networks (.gov),
3.3.2.2 Financial Institutions and Networks,
5.7 Government Organizations
No
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) 2011-07-26 Cybersecurity: Infrastructure An Overview of Risks to Critical Government Hearing 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation,
5.3 Government Organizations
No
U.S. House Committee on Oversight and Government Reform 2011-07-07 Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat Government Hearing 3.3 Security Targets,
4.7 Public-Private Cooperation,
5.3 Government Organizations
No
U.S. House Committee on Financial Services (field hearing in Hoover, AL) 2011-06-29 Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information Government Hearing 3.3.2.2 Financial Institutions and Networks,
5.1 Regulation/Liability
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2011-06-24 Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal Government Hearing 3.3.1.1 Government Networks (.gov),
4.9 Identity Management,
5.3 Government Organizations
No
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade) 2011-06-02 Sony and Epsilon: Lessons for Data Security Legislation Government Hearing 4.9 Identity Management,
5.1 Regulation/Liability,
5.2 Private Efforts/Organizations
No
U.S. House Committee on Energy and Commerce 2011-05-31 Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act Government Hearing 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation,
5.1 Regulation/Liability
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies) 2011-05-26 Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296 Potential to Promote Technology and Combat Terrorism] Government Hearing 4.11 Cybercrime,
5.1 Regulation/Liability,
5.7 Technology
No
U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education) 2011-05-25 Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts Government Hearing 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations,
5.7 Technology
No
U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet) 2011-05-25 Cybersecurity: Problems Innovative Solutions to Challenging Government Hearing 4.7 Public-Private Cooperation,
4.11 Cybercrime,
5.2 Private Efforts/Organizations
No
U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations) 2011-05-25 Cybersecurity: Assessing the Immediate Threat to the United States Government Hearing 3.1 The Threat and Skeptics,
3.3.1 Public Critical Infrastructure,
4.7 Public-Private Cooperation
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2011-04-15 DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure Government Hearing 3.3.2 Private Critical Infrastructure,
4.7 Public-Private Cooperation,
5.1 Regulation/Liability
No
U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations) 2011-04-15 Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology Government Hearing 3.2.1 Governments,
4.12 Cyberwar,
4.13 Espionage
No
U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power) 2011-03-31 Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs Government Hearing 4.2 Economics of Cybersecurity,
5.3 Government Organizations
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2011-03-16 Examining the Cyber Threat to Critical Infrastructure and the American Economy Government Hearing 3.1 The Threat and Skeptics,
3.3 Security Targets,
4.2 Economics of Cybersecurity
No
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) 2011-03-16 2012 Budget Request from U.S. Cyber Command Government Hearing 3.3.1.2 Military Networks (.mil),
4.2 Economics of Cybersecurity
No
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) 2011-02-11 What Should the Department of Defense’s Role in Cyber Be? Government Hearing 3.1 The Threat and Skeptics,
4.12 Cyberwar,
5.3 Government Organizations
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2011-02-11 Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities Government Hearing 3.3.2 Private Critical Infrastructure,
5.1 Regulation/Liability,
5.7 Technology
No
U.S. House Permenant Select Committee on Intelligence 2011-02-10 World Wide Threats Government Hearing 3.1 The Threat and Skeptics,
5.1 Regulation/Liability,
5.3 Government Organizations
No
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) 2012-02-01 Consideration and Markup of H.R. 3674 Government Hearing 4.6 Information Sharing,
4.7 Public-Private Cooperation,
5.1 Regulation/Liability
No
U.S. House Permenant Select Committee on Intelligence 2011-12-01 Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011 Government Hearing 4.6 Information Sharing,
5.1 Regulation/Liability
No
U.S. House Committee on Science, Space and Technology 2011-07-21 Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011 Government Hearing 4.2.1 Risk Management and Investment,
5.1 Regulation/Liability,
5.7 Technology
No
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing) 2011-06-15 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach Government Hearing 4.6 Information Sharing/Disclosure,
4.10 Privacy,
5.1 Regulation/Liability
No
Graham David E 2010 Cyber Threats and the Law of War Journal Article 3.2.1 States,
4.12 Cyberwar,
5.5 International Law (including Laws of War)
Yes
Schmitt Michael N 2004 Direct Participation in Hostilities and 21st Century Armed Conflict Journal Article 3.2.1 States,
4.12 Cyberwar,
5.5 International Law (including Laws of War)
Yes