Difference between revisions of "Template:Filtered Table"

From Cybersecurity Wiki
Jump to: navigation, search
Line 8: Line 8:
 
| align="center" style="background:#f0f0f0;"|'''Category'''
 
| align="center" style="background:#f0f0f0;"|'''Category'''
 
|-
 
|-
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"]||||
+
<noinclude>| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"]||||
 
|-
 
|-
 
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
 
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
Line 27: Line 27:
 
|-
 
|-
 
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  "National Security Threats in Cyberspace "]||||
 
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  "National Security Threats in Cyberspace "]||||
|-
+
|-</noinclude>
 
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||
 
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||
 
|-
 
|-

Revision as of 15:36, 8 June 2012

Filtering for category: All Categories

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"
Business Roundtable 2012-10-11 "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "
Centre for Secure Information Technologies 2012-09-11 "World Cybersecurity Technology Research Summit (Belfast 2011) "
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "
Center for a New American Security 2012-06-11 "America’s Cyber Future: Security and Prosperity in the Information Age "
European Network and Information Security Agency (ENISA) 2011-04-11 "Resilience of the Internet Interconnection Ecosystem, at: "
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 "Cybersecurity Two Years Later "
National Research Council 2010-09-21 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 "National Security Threats in Cyberspace "
GAO 2012-02-28 "Cybersecurity: Challenges to Securing the Modernized Electricity Grid " Government Report
GAO 2011-12-09 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use " Government Report
GAO 2011-11-29 "Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: " Government Report
GAO 2011-10-17 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management " Government Report
GAO 2011-10-05 "Information Security: Additional Guidance Needed to Address Cloud Computing Concerns " Government Report
GAO 2011-10-03 "Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements " Government Report
GAO 2011-10-17 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management " Government Report
GAO 2011-07-29 "Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates " Government Report
GAO 2011-07-26 "Continued Attention Needed to Protect Our Nation’s Critical Infrastructure " Government Report
GAO 2011-07-25 "Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities " Government Report
GAO 2010-08-16 "Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed " Government Report
GAO 2011-07-08 "Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain " Government Report
GAO 2011-03-16 "Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems " Government Report
GAO 2011-01-12 "Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed " Government Report
GAO 2010-11-30 "Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk " Government Report
GAO 2010-10-06 "Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed " Government Report
GAO 2010-09-23 "DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened " Government Report
GAO 2010-09-15 "Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems " Government Report
GAO 2010-08-02 "United States Faces Challenges in Addressing Global Cybersecurity and Governance " Government Report
GAO 2010-07-01 "Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing " Government Report
GAO 2010-06-16 "Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats " Government Report
GAO 2010-03-24 "Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: " Government Report
GAO 2010-03-16 "Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats " Government Report
GAO 2010-04-12 "Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies " Government Report
GAO 2010-03-05 "Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative " Government Report
GAO 2009-11-17 "Continued Efforts Are Needed to Protect Information Systems from Evolving Threats " Government Report
GAO 2003-08-27 "Efforts to Improve Information sharing Need to Be Strengthened " Government Report
White House/OMB 2011-12-06 "Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program " Government Report
White House/OMB 2011-10-07 "Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information " Government Report
White House/OMB 2011-09-14 "FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa " Government Report
White House/OMB 2011-05-16 "International Strategy for Cyberspace " Government Report
White House/OMB 2011-05-12 "Cybersecurity Legislative Proposal (Fact Sheet) " Government Report