Cyber-security regulation

Results: 835



#Item
421Cyberwarfare / Standards organizations / Computer security / Cyber-security regulation / Privacy / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / Computer network security / Security / Ethics

December 13, 2013 Via e-­‐mail to [removed] Information Technology Laboratory ATTN: Mr. Adam Sedgewick National Institute of Standards and Technology 10 Bureau Drive, Stop 8930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 17:38:06
422Public safety / Cyberwarfare / Hacking / Military technology / Computer security / Surveillance / Ronald Deibert / Cyber-security regulation / Security / National security / Crime prevention

Breakout Session 3 - Cyber-Warfare Notes by Krista Boa (Discussant: Sukanya Pillay / Moderator: David Lyon, CCF) Ron Deibert, Citizen Lab, University of Toronto, Canada Blurring Boundaries: Crime and Espionage Online Cat

Add to Reading List

Source URL: www.digitallymediatedsurveillance.ca

Language: English - Date: 2011-10-03 01:17:20
423Public safety / Cyberwarfare / Security engineering / Computer crimes / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / National Cyber Security Division / National security / Security / United States Department of Homeland Security

THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2013-02-25 10:00:27
424Crime prevention / National security / Computer network security / Public safety / Information security / Cyberwarfare / Security controls / Cyber-security regulation / Information security management system / Security / Data security / Computer security

Insights on governance, risk and compliance October[removed]Under cyber attack

Add to Reading List

Source URL: www.ey.com

Language: English - Date: 2014-12-04 08:59:37
425Public safety / National security / Institute for Information Infrastructure Protection / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberterrorism / Cyber-security regulation / National Cyber Security Division / Cyberwarfare / Computer crimes / Security

A CONSORTIUM OF EXPERTS DEDICATED TO STRENGTHENING THE CYBER INFRASTRUCTURE OF THE UNITED STATES Volume 1, Issue 1

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:36
426Public safety / Military science / United States Coast Guard / United States Computer Emergency Readiness Team / United States Cyber Command / National Cyber Security Division / Cyber-security regulation / Cyberwarfare / Military organization / United States Department of Homeland Security

ALIEN MIGRANT INTERDICTION OPERATIONS

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2013-03-21 14:54:14
427Federal Energy Regulatory Commission / Electronic warfare / Hacking / Military technology / Government / Cyber-security regulation / War / Cyberwarfare / United States Department of Homeland Security / National security

                                           

Add to Reading List

Source URL: www.lppc.org

Language: English - Date: 2013-06-18 16:14:35
428Hacking / Military technology / National security / Cyber-security regulation / War / Computer security / Internet-related prefixes / Cyberwarfare / Security / Electronic warfare

July 21, 2014 TO THE MEMBERS OF THE UNITED STATES SENATE: The U.S. Chamber of Commerce, the world’s largest business federation representing the interests of more than three million businesses of all sizes, sectors, a

Add to Reading List

Source URL: op.bna.com

Language: English - Date: 2014-07-21 16:45:43
429Law / 106th United States Congress / Gramm–Leach–Bliley Act / United States federal banking legislation / Privacy / Government / Internet privacy / Privacy policy / Cyber-security regulation / Privacy law / Ethics / Computer law

William D. Ford Federal Direct Loan Program Gramm-Leach-Bliley Act Privacy Notice In 1999, Congress enacted the Gramm-Leach-Bliley Act (Public Law[removed]This Act requires that lenders provide certain information to t

Add to Reading List

Source URL: www.direct.ed.gov

Language: English - Date: 2010-03-31 11:51:09
430Public safety / United States Department of Homeland Security / Electronic warfare / Hacking / Military technology / Critical infrastructure protection / Computer security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / National security / Security / Cyberwarfare

Microsoft Word - Dial C for Cyberattack

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2013-02-25 10:00:25
UPDATE