Cyber-security regulation

Results: 835



#Item
531National security / Computer network security / Data security / Public safety / Information security / Network security / Computer crime / Security controls / Cyber-security regulation / Security / Computer security / Crime prevention

Protect yourself online Connect Smart for Business SME TOOLKIT

Add to Reading List

Source URL: www.connectsmart.govt.nz

Language: English - Date: 2014-09-07 19:21:07
532Public safety / National security / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / United States Department of Homeland Security / Internet privacy / Cyber-security regulation / Computer crimes / Cyberwarfare / Security

F:\R\113\RP1\H624_RPT.XML 113TH CONGRESS 1st Session }

Add to Reading List

Source URL: democrats.rules.house.gov

Language: English - Date: 2013-04-16 18:26:53
533Security / Computer network security / Hacking / Australian National Audit Office / Cyberterrorism / International Multilateral Partnership Against Cyber Threats / Attack / National Cyber Security Division / Cyber-security regulation / Computer crimes / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.anao.gov.au

Language: English - Date: 2013-04-14 21:54:35
534Security / Public safety / Computer crimes / National Cyber Security Division / Einstein / United States Computer Emergency Readiness Team / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / National Protection and Programs Directorate / United States Department of Homeland Security / Cyberwarfare / Computer security

Privacy Impact Assessment Update for the Joint Cybersecurity Services Program (JCSP), Defense Industrial Base (DIB) – Enhanced Cybersecurity Services (DECS)

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-07-19 12:31:54
535Government Accountability Office / Government / United States Computer Emergency Readiness Team / Emergency / Cyber-security regulation / National Cyber Security Division / United States Department of Homeland Security / Public safety / Security

GAO[removed]Highlights, INFORMATION SECURITY: Agencies Need to Improve Cyber Incident Response Practices

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-05-30 10:01:55
536Security awareness / Security / Computing / Cyber security standards / Cyber-security regulation / Computer security / Cyberwarfare / Center for Infrastructure Assurance and Security

Shed some light on areas for improvement in your cyber security programs. Attend the On-site Cyber Security Solutions Workshop to find out how.

Add to Reading List

Source URL: cias.utsa.edu

Language: English - Date: 2014-02-26 09:50:50
537Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Cyber-security regulation / United States Department of Homeland Security / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Security

Cyber Initiative Memo THE WILLIAM AND FLORA HEWLETT FOUNDATION Memorandum Date: March 27, 2014

Add to Reading List

Source URL: www.hewlett.org

Language: English - Date: 2014-04-07 17:49:07
538Infrastructure / Cyberwarfare / Security engineering / Critical infrastructure protection / Computer security / Critical infrastructure / Cyber-security regulation / Internet kill switch / National security / United States Department of Homeland Security / Security

Defending America’s Cyberspace National Plan for Information Systems Protection Version 1.0

Add to Reading List

Source URL: clinton5.nara.gov

Language: English - Date: 2000-11-07 11:09:40
539Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Cyber-security regulation / United States Department of Homeland Security / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer security

THE CYBERSECURITY CHALLENGE Government, industry, and consumers depend on secure and reliable networks and information systems for daily communications and transactions. Vulnerabilities to cyber attacks could

Add to Reading List

Source URL: www.research.umd.edu

Language: English - Date: 2012-12-14 17:01:36
540Cyber-security regulation / Smart grid / Cyberwarfare / Technology

Docket 7307 Supplemental Memorandum of Understanding

Add to Reading List

Source URL: psb.vermont.gov

Language: English - Date: 2011-11-09 11:29:54
UPDATE