ALL FEATURED TOPICS CYBER POLICY

Only 1/2! You are seeing results from the Public Collection, which is half the size of the Full Collection. Sign in to search everything (see eligibility).

Cyber Policy

Browsing featured resources (30)

Search general resources for Cyber Policy (456)

30 featured resources    updated Sep 20, 2016

 Jump to grouping:

Audits & Investigations

  • Information Security: DHS Needs to Enhance Capabilities, Improve Planning, and Support Greater Adoption of Its National Cybersecurity Protection System, Report to Congressional Committees
    "Cyber-based attacks on federal systems continue to increase. GAO [Government Accountability Office] has designated information security as a government-wide high-risk area since 1997. This was expanded to include the pro… more
    2016-01
    7715KB

CRS Reports

  • Cybersecurity: Authoritative Reports and Resources, by Topic [May 7, 2015]
    "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecuri… more
    Tehan, Rita
    2015-05-07
    908KB
  • Cybersecurity: Legislation, Hearings, and Executive Branch Documents [March 30, 2016]
    "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, a… more
    Tehan, Rita
    2016-03-30
    1001KB

DoD Reports

  • Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications
    From the Summary, "Military cyberspace operations have been ongoing since before the advent of the Internet. Such operations have evolved significantly over the past 2 decades and are now emerging into the realm of military op… more
    Caton, Jeffrey L.
    2015-01
    2726KB
  • Department of Defense and the Power of Cloud Computing: Weighing Acceptable Cost versus Acceptable Risk
    "Cloud computing, a shared pool of computing resources that are readily available to meet the user's rapidly changing demands, has opened up many new opportunities and risks for society that in many ways are revolutionary. The… more
    Dudash, Steven C.
    2016-04
    620KB
  • DoD Cyber Strategy [April 2015]
    "The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American va… more
    2015-04
    6484KB

Executive Branch

  • Cybersecurity Strategy Implementation Plan (CSIP) for the Federal Civilian Government: Memorandum for Heads of Executive Departments and Agencies
    From the Executive Summary: "Strengthening the cybersecurity of Federal networks, systems, and data is one of the most important challenges we face as a Nation. As a result, the Federal Government is bringing significant resou… more
    Donovan, Shaun; Scott, Anthony
    2015-10-30
    361KB
  • Executive Order 13636: Improving Critical Infrastructure Cybersecurity
    "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security ch… more
    Obama, Barack
    2013-02-19
    332KB
  • Executive Order 13694: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities
    "By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies… more
    Obama, Barack
    2015-01-01
    198KB
  • Executive Order 13718: Commission on Enhancing National Cybersecurity
    "[I]n order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to tak… more
    Obama, Barack
    2016-02-09
    197KB
  • Federal Cybersecurity Research and Development Strategic Plan: Ensuring Prosperity and National Security
    "Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities and cybersecurity itself diminish these benefits. Advances in cybersecurity are urgently needed… more
    2016-02
    973KB
  • International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
    "The foundation of the United States' international cyberspace policy is the belief that networked technologies hold immense potential for our Nation, and for the world. Over the last three decades we, the United States, have wa… more
    2011-05
    2567KB
  • National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security and Privacy
    "A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses 'Our digital infr… more
    2011-04
    2505KB

Hearings

  • Industry Perspectives on the President's Cybersecurity Information Sharing Proposal, Hearing Before the Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, U.S. House of Representatives, One Hundred Fourteenth Congress, First Session, March 4, 2015
    This is a compilation of the March 4, 2015 hearing on "Industry Perspectives on the President's Cybersecurity Information Sharing Proposal" held before the House Committee on Homeland Security. From the opening statement of Ch… more
    2015-03-04
    1287KB
  • S. Hrg. 113-295: The Cybersecurity Partnership Between the Private Sector and Our Government: Protecting Our National and Economic Security, Joint Hearing Before the Committee on Commerce, Science and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, First Session, March 7, 2013
    This is the March 7, 2013 hearing, "The Cybersecurity Partnership Between the Private Sector and Our Government: Protecting Our National and Economic Security" before the U.S. Senate Committees on Commerce, Science, and Transp… more
    2014
    1147KB
  • Serial No. 113-6: Cybersecurity Research and Development: Challenges and Solutions, Hearing Before the Subcommittee on Technology and Subcommittee on Research, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, First Session, Tuesday, February 26, 2013
    This is the Tuesday, February 26, 2013 hearing on "Cybersecurity Research and Development: Challenges and Solutions," held before the House of Representatives Committee on Science, Space and Technology. From the opening statem… more
    2013
    3318KB
  • United States Cybersecurity Policy and Threats, Hearing Before the Committee on Armed Services, U.S. Senate, One Hundred Fourteenth Congress, First Session, September 29, 2015
    This is a compilation of the September 29, 2015 hearing entitled "United States Cybersecurity Policy and Threats," held before the Senate Committee on Armed Services. From the opening statement of committee chairman John McCai… more
    2015-09-29
    8272KB

International Perspective

  • U.S.-China Cybersecurity Issues: Roundtable Before the U.S. China Economic and Security Review Commission, One Hundred Thirteenth Congress, First Session, July 11, 2013
    From the opening statement of William Reinsch: "Welcome everybody, we're going to begin. You can tell from the arrangement that this is informal, at least as informal as we ever get. This is a roundtable on U.S.-China cyber se… more
    2013-07-11
    500KB

Research & Analysis

  • National Critical Infrastructure Security and Resilience Research and Development Plan
    "The purpose of this 'National Critical Infrastructure Security and Resilience Research and Development Plan' (hereafter referred to as the National CISR R&D Plan or the Plan) is to identify National R&D Priority Areas that in… more
    2015-11
    653KB

Theses

  • Barriers to Cyber Information Sharing
    From the thesis abstract: "As our reliance on the Internet grows, our interconnected networks become more vulnerable to cyberattacks. Cyberattacks and other cyber threats can cause disastrous results, especially if a coordinat… more
    Harwood, Deanne I.
    2014-12
    849KB
  • Cybersecurity 'Lanes in the Road' for the Department of Homeland Security
    From the thesis abstract: "The roles and responsibilities for cybersecurity within the national government are not clearly delineated. This thesis asks if the current allocations of cybersecurity responsibilities to DHS are op… more
    Shaffer, David G.
    2016-06
    447KB

Websites

  • Congressional Cybersecurity Caucus [website]
    "Congressman Jim Langevin (RI-D) and Congressman Mike McCaul (R-TX) founded the first-ever Congressional Cybersecurity Caucus in September 2008. As Co-Chairs of the CSIS [Center for Strategic and International Studies] Commi… more
    23KB