<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/cybersecurity/history/US_Government_Hearings?feed=atom</id>
	<title>US Government Hearings - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/cybersecurity/history/US_Government_Hearings?feed=atom"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/cybersecurity/history/US_Government_Hearings"/>
	<updated>2026-04-14T18:13:14Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/cybersecurity/?title=US_Government_Hearings&amp;diff=6475&amp;oldid=prev</id>
		<title>Gili: Replaced content with &quot;&#039;&#039; TOC-&gt; Resource by Type-&gt; Government Reports and Documents-&gt;[[U.S. Government Hearings...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/cybersecurity/?title=US_Government_Hearings&amp;diff=6475&amp;oldid=prev"/>
		<updated>2012-07-31T20:52:12Z</updated>

		<summary type="html">&lt;p&gt;Replaced content with &amp;quot;&amp;#039;&amp;#039;&lt;a href=&quot;/cybersecurity/Table_of_Contents&quot; title=&quot;Table of Contents&quot;&gt; TOC-&amp;gt;&lt;/a&gt;&lt;a href=&quot;/cybersecurity/Resource_by_Type&quot; title=&quot;Resource by Type&quot;&gt; Resource by Type-&amp;gt;&lt;/a&gt;&lt;a href=&quot;/cybersecurity/Government_Reports_and_Documents&quot; title=&quot;Government Reports and Documents&quot;&gt; Government Reports and Documents-&amp;gt;&lt;/a&gt;[[U.S. Government Hearings...&amp;quot;&lt;/p&gt;
&lt;a href=&quot;//cyber.harvard.edu/cybersecurity/?title=US_Government_Hearings&amp;amp;diff=6475&amp;amp;oldid=6452&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Gili</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/cybersecurity/?title=US_Government_Hearings&amp;diff=6452&amp;oldid=prev</id>
		<title>Gili: Created page with &quot;{| class=&quot;wikitable sortable&quot; border=&quot;1&quot; cellpadding=&quot;1&quot; cellspacing=&quot;0&quot; style=&quot;border: 1px solid LightGrey;&quot; |- ! align=&quot;center&quot; style=&quot;background-color:#f0f0f0;&quot;|&#039;&#039;&#039;Author/A...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/cybersecurity/?title=US_Government_Hearings&amp;diff=6452&amp;oldid=prev"/>
		<updated>2012-07-30T12:55:06Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border: 1px solid LightGrey;&amp;quot; |- ! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Author/A...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border: 1px solid LightGrey;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Author/Agency&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Date&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Title&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Type&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Category&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Synopsis&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Armed Services||2012-03-27||[http://armed-services.senate.gov/e_witnesslist.cfm?id=5283 To receive testimony on U.S. Strategic Command and U.S. Cyber Command in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program.]||U.S. Government Hearing||3.2.1 States,&amp;lt;br&amp;gt;4.2 Economics of Cybersecurity,&amp;lt;br&amp;gt;4.12 Cyberwar||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2012-03-20||[http://www.armed-services.senate.gov/Transcripts/2012/03%20March/12-14%20-%203-20-12.pdf To receive testimony on cybersecurity research and development in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program]||U.S. Government Hearing||4.2.1 Risk Management and Investment,&amp;lt;br&amp;gt;4.12 Cyberwar,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Judiciary||2012-03-13||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=8b30fa475a5089d793576cd947089793 The Freedom of Information Act: Safeguarding Critical Infrastructure Information and the Public’s Right to Know]||U.S. Government Hearing||3.3.1 Public Critical Infrastructure,&amp;lt;br&amp;gt;4.6 Information Sharing/Disclosure,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Homeland Security and Governmental Affairs||2012-02-16||[http://www.hsgac.senate.gov/hearings/securing-americas-future-the-cybersecurity-act-of-2012 Securing America’s Future: The Cybersecurity Act of 2012]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,&amp;lt;br&amp;gt;4.6 Information Sharing/Disclosure,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Judiciary||2011-09-07||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=3d9031b47812de2592c3baeba629084b Cybercrime: Updating the Computer Fraud and Abuse Act to Protect Cyberspace and Combat Emerging Threats]||U.S. Government Hearing||3.11 Cybercrime,&amp;lt;br&amp;gt;4.13.2 Industrial Espionage,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Small Business and Entrepreneurship||2011-07-25||[http://www.sbc.senate.gov/public/index.cfm?p=Hearings&amp;amp;ContentRecord_id=6b4d51de-dd67-434b-869f-a717b315e6c2&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=43eb5e02-e987-4077-b9a7-1e5a9cf28964&amp;amp;MonthDisplay=7&amp;amp;YearDisplay=2011 Role of Small Business in Strengthening Cybersecurity Efforts in the United States]||U.S. Government Hearing||4.2.2 Incentives,&amp;lt;br&amp;gt;4.7 public-Private Cooperation||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Commerce, Science and Transportation||2011-06-29||[http://commerce.senate.gov/public/index.cfm?p=Hearings&amp;amp;ContentRecord_id=e2c2a2ca-91d6-48a2-b5ea-b5c4104bdb97&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=b06c39af-e033-4cba-9221-de668ca1978a&amp;amp;MonthDisplay=6&amp;amp;YearDisplay=2011 Privacy and Data Security: Protecting Consumers in the Modern World]||U.S. Government Hearing||4.9 Identity Management,&amp;lt;br&amp;gt;4.10 Privacy,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-06-21||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16e1bbe Cybersecurity: Evaluating the Administration’s Proposals]||U.S. Government Hearing||1. Overview,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Banking, Housing and Urban Affairs||2011-06-21||[http://banking.senate.gov/public/index.cfm?FuseAction=Hearings.Hearing&amp;amp;Hearing_ID=87487cb2-4710-4c09-a1b0-a9e12cda88f1 Cybersecurity and Data Protection in the Financial Sector]||U.S. Government Hearing||3.3.2.2 Financial Institutions and Networks,&amp;lt;br&amp;gt;4.10 Privacy,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Homeland Security and Governmental Affairs||2011-05-23||[http://www.hsgac.senate.gov/hearings/protecting-cyberspace-assessing-the-white-house-proposal Protecting Cyberspace: Assessing the White House Proposal]||U.S. Government Hearing||3.3 Security Targets,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Energy and Natural Resources||2011-05-05||[http://www.energy.senate.gov/public/index.cfm/hearings-and-business-meetings?ID=929c1441-da25-c99d-3e27-af20c29e3b4b Cybersecurity of the Bulk-Power System and Electric Infrastructure]||U.S. Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-05-03||[http://www.armed-services.senate.gov/Transcripts/2011/05%20May/11-31%20-%205-3-11.pdf To receive testimony on the health and status of the defense industrial base and its science and technology-related elements]||U.S. Government Hearing||3.3.1.2 Military Networks (.mil),&amp;lt;br&amp;gt;4.3 Supply Chain Issues,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-04-12||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16a9959 Cyber Security: Responding to the Threat of Cyber Crime and Terrorism]||U.S. Government Hearing||4.11 Cybercrime,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Judiciary||2011-03-30||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da1697f72 Oversight of the Federal Bureau of Investigation]||U.S. Government Hearing||3. Threats and Actors,&amp;lt;br&amp;gt;4.6 Information Sharing/Disclosure,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Energy and Natural Resources||2011-03-15||[ Cybersecurity and Critical Electric Infrastructure (closed)]||U.S. Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Homeland Security and Governmental Affairs||2011-03-10||[http://www.hsgac.senate.gov/hearings/information-sharing-in-the-era-of-wikileaks-balancing-security-and-collaboration Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration]||U.S. Government Hearing||3.3.1 Public Critical Infrastructure,&amp;lt;br&amp;gt;4.6 Information Sharing/Disclosure,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. Senate Committee on Homeland Security and Governmental Affairs||2011-02-17||[http://www.hsgac.senate.gov/hearings/the-homeland-security-departments-budget-submission-for-fiscal-year-2012 Homeland Security Department’s Budget Submission for Fiscal Year 2012]||U.S. Government Hearing||||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence)||2012-04-26||[http://homeland.house.gov/hearing/joint-subcommittee-hearing-iranian-cyber-threat-us-homeland Iranian Cyber Threat to U.S. Homeland]||U.S. Government Hearing||3.2.1 States,&amp;lt;br&amp;gt;3.3 Security Targets,&amp;lt;br&amp;gt;4.12 Cyberwar||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;3.2 Actors and Incentives||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence)||2012-04-19||[http://homeland.house.gov/hearing/subcommittee-hearing-dhs-and-doe-national-labs-finding-efficiencies-and-optimizing-outputs The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development]||U.S. Government Hearing||4.2.1 Risk Management and Investment,&amp;lt;br&amp;gt;5.3 Government Organizations,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology)||2012-03-28||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9397 Cybersecurity:Threats to Communications Networks and Public-Sector Responses]||U.S. Government Hearing||3.3.3 Communications,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2012-03-27||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9393 IT Supply Chain Security: Review of Government and Industry Efforts]||U.S. Government Hearing||4.3 Supply Chain Issues||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2012-03-20||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=92823c77-38f0-4c20-a3ee-36729e8e19a3&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&amp;amp;MonthDisplay=3&amp;amp;YearDisplay=2012 Fiscal 2013 Defense Authorization: IT and Cyber Operations]||U.S. Government Hearing||4.2.1 Risk Management and Investment,&amp;lt;br&amp;gt;Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology)||2012-03-07||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9342 Cybersecurity:Networks     The Pivotal Role of Communications]||U.S. Government Hearing||3.3.3 Communications,&amp;lt;br&amp;gt;5.3 Government Organizations,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight)||2012-02-29||[http://science.house.gov/hearing/subcommittee-investigations-and-oversight-hearing-nasa-cybersecurity-examination-agency%E2%80%99s NASA Cybersecurity: An Examination of the Agency’s Information Security]||U.S. Government Hearing||3.3.1 Public Critical Infrastructure,&amp;lt;br&amp;gt;5.3 Government Organizations,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2012-02-28||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=9318 Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security]||U.S. Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,&amp;lt;br&amp;gt;4.2.1 Risk Management and Investment||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology)||2011-12-01||[http://smallbusiness.house.gov/Calendar/EventSingle.aspx?EventID=270278 Cyber Security: Protecting Your Small Business]||U.S. Government Hearing||4.2.1 Risk Management and Investment,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on the Judiciary||2011-11-16||[http://judiciary.house.gov/hearings/hear_11162011.html Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act)]||U.S. Government Hearing||4.11 Cybercrime,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security)||2011-11-15||[http://judiciary.house.gov/hearings/hear_11152011.html Cybersecurity: Protecting America’s New Frontier]||U.S. Government Hearing||4.10 Privacy,&amp;lt;br&amp;gt;4.11 Cybercrime||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-11-03||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=42c170fb-8e0c-453a-81a2-f4ee3fa89283&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&amp;amp;MonthDisplay=11&amp;amp;YearDisplay=2011 Institutionalizing Irregular Warfare Capabilities]||U.S. Government Hearing||4.12 Cyberwar||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology)||2011-10-06||[http://homeland.house.gov/hearing/cloud-computing-what-are-security-implications Cloud Computing: What are the Security Implications?]||U.S. Government Hearing||3.3.3.3 Cloud Computing,&amp;lt;br&amp;gt;4.13 Espionage,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||U.S. Government Hearing||4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;4.13.2 Industrial Espionage,&amp;lt;br&amp;gt;5.4 International Cooperation||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation)||2011-09-21||[http://science.house.gov/hearing/technology-and-innovation-subcommittee-hearing-cloud-computing The Cloud Computing Outlook]||U.S. Government Hearing||3.3.3.3 Cloud Computing,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit)||2011-09-14||[http://financialservices.house.gov/Calendar/EventSingle.aspx?EventID=258792 Combating Cybercriminals]||U.S. Government Hearing||3.3.1.1 Government Networks (.gov),&amp;lt;br&amp;gt;3.3.2.2 Financial Institutions and Networks,&amp;lt;br&amp;gt;5.7 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations)||2011-07-26||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8824 Cybersecurity: Infrastructure An Overview of Risks to Critical]||U.S. Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||U.S. Government Hearing||3.3 Security Targets,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Financial Services (field hearing in Hoover, AL)||2011-06-29||[http://financialservices.house.gov/Calendar/EventSingle.aspx?EventID=246611 Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information]||U.S. Government Hearing||3.3.2.2 Financial Institutions and Networks,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||U.S. Government Hearing||3.3.1.1 Government Networks (.gov),&amp;lt;br&amp;gt;4.9 Identity Management,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade)||2011-06-02||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8653 Sony and Epsilon: Lessons for Data Security Legislation]||U.S. Government Hearing||4.9 Identity Management,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.2 Private Efforts/Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce||2011-05-31||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8639 Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act]||U.S. Government Hearing||3.3.2.1 Electricity, Oil and Natural Gas,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||U.S. Government Hearing||4.11 Cybercrime,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education)||2011-05-25||[http://science.house.gov/hearing/subcommittee-research-and-science-education-subcommittee-technology-and-innovation-%E2%80%93-joint Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts]||U.S. Government Hearing||3.3.1.1 Government Networks (.gov),&amp;lt;br&amp;gt;5.3 Government Organizations,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||U.S. Government Hearing||4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;4.11 Cybercrime,&amp;lt;br&amp;gt;5.2 Private Efforts/Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;3.3.1 Public Critical Infrastructure,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations)||2011-04-15||[http://foreignaffairs.house.gov/hearing_notice.asp?id=1279 Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology]||U.S. Government Hearing||3.2.1 Governments,&amp;lt;br&amp;gt;4.12 Cyberwar,&amp;lt;br&amp;gt;4.13 Espionage||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs  ]||U.S. Government Hearing||4.2 Economics of Cybersecurity,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;3.3 Security Targets,&amp;lt;br&amp;gt;4.2 Economics of Cybersecurity||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&amp;amp;MonthDisplay=3&amp;amp;YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||U.S. Government Hearing||3.3.1.2 Military Networks (.mil),&amp;lt;br&amp;gt;4.2 Economics of Cybersecurity||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&amp;amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;amp;Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&amp;amp;MonthDisplay=2&amp;amp;YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;4.12 Cyberwar,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3.1 The Threat and Skeptics,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.3 Government Organizations||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||U.S. Government Hearing||4.6 Information Sharing,&amp;lt;br&amp;gt;4.7 Public-Private Cooperation,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Permenant Select Committee on Intelligence||2011-12-01||[https://intelligence.house.gov/markup/mark-hr-xxxx-%E2%80%9Ccyber-intelligence-sharing-and-protection-act-2011%E2%80%9D Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011]||U.S. Government Hearing||4.6 Information Sharing,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||U.S. Government Hearing||4.2.1 Risk Management and Investment,&amp;lt;br&amp;gt;5.1 Regulation/Liability,&amp;lt;br&amp;gt;5.7 Technology||No&lt;br /&gt;
|-&lt;br /&gt;
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||U.S. Government Hearing||4.6 Information Sharing/Disclosure,&amp;lt;br&amp;gt;4.10 Privacy,&amp;lt;br&amp;gt;5.1 Regulation/Liability||No&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Gili</name></author>
	</entry>
</feed>