Cyber-security regulation

Results: 835



#Item
271Computer security / United States Department of Homeland Security / Computer crimes / Secure communication / National Strategy for Trusted Identities in Cyberspace / National Cyber Security Division / Cyber-security regulation / Computer network security / Cyberwarfare / Security

THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 3, 2011

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:33:00
272Public safety / Computer security / Computer crimes / National security / Military technology / United States Computer Emergency Readiness Team / National Protection and Programs Directorate / National Cyber Security Division / Cyber-security regulation / Security / United States Department of Homeland Security / Cyberwarfare

Testimony of Larry Zelvin National Cybersecurity and Communications Integration Center Director National Protection and Programs Directorate U.S. Department of Homeland Security

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-04 10:23:42
273Public safety / United States Department of Homeland Security / Computer crimes / Cyber-security regulation / Computer security / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Government

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:46
274National security / Cyber-security regulation / Idaho / Idaho National Laboratory / Computer security / Next Magazine / International Multilateral Partnership Against Cyber Threats / Public safety / Security / Cyberwarfare / Crime prevention

1 CYBERSECURITY[removed]THE BROOKINGS INSTITUTION IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY:

Add to Reading List

Source URL: www.brookings.edu

Language: English - Date: 2014-03-04 11:05:05
275Hacking / Military technology / Cyberwarfare / Security / War / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Computer security / Electronic warfare

The UK Cyber Security Strategy Report on Progress and Forward Plans December[removed]

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-12-11 07:52:10
276Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / War / United States Computer Emergency Readiness Team / Cyber-security regulation / National Cyber Security Division / Cyberwarfare / Security / Computer security

Opening Statement of the Honorable Marsha Blackburn Committee on Energy and Commerce Hearing on “Cyber Threats and Security Solutions” May 21, 2013 (As Prepared for Delivery) American companies, the U.S. government,

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2013-05-21 09:47:30
277Military technology / Cyberwarfare / Public safety / Computer crimes / War / Computer security / United States Department of Homeland Security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Electronic warfare / Hacking

Remarks of Deputy Secretary Raskin at The Texas Bankers’ Association Executive Leadership Cybersecurity Conference[removed]Cybersecurity for Banks: 10 Questions for Executives and their Boards As prepared for deliver

Add to Reading List

Source URL: www.csbs.org

Language: English - Date: 2014-12-03 14:17:20
278Computer security / Crime prevention / National security / Secure communication / Internet privacy / Public safety / Crime / International Cybercrime / Cyber-security regulation / Security / Computer crimes / Computer network security

December 4, 2014 Dear Congressional Leaders: As the co-chairs of the Merchant and Financial Associations Cybersecurity Partnership, we are writing on behalf of all of the 19 participating trade association members to sha

Add to Reading List

Source URL: fsroundtable.org

Language: English - Date: 2014-12-04 11:59:01
279Hacking / Military technology / Career Pathways / Information systems / Computer security / War / Bachelor of Science in Information Technology / Cyber-security regulation / Security / Cyberwarfare / Electronic warfare

INFORMATION TECHNOLOGY IN VIRGINIA Welcome to the Information Technology (IT) in Virginia Career Cluster Brief. Jobs in information technology frequently intersect with opportunities across career clusters, thanks to the

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2014-12-04 13:36:26
280Cyberwarfare / Public safety / Security engineering / Computer crimes / Northrop Grumman / Computer security / Critical infrastructure protection / National Cyber Security Division / Cyber-security regulation / National security / United States Department of Homeland Security / Security

House Energy & Commerce Committee Hearing: Cyber Threats and Security Solutions 10:00 am, May 21, 2013 One page Overview of Dr. Mike Papay’s Statement: Northrop Grumman is one of the leading cybersecurity providers to

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-05-20 09:51:18
UPDATE