Cyber-security regulation

Results: 835



#Item
541Computer crimes / Security / National Strategy for Trusted Identities in Cyberspace / International Telecommunication Union / Cyber-security regulation / Cyberspace / International Multilateral Partnership Against Cyber Threats / Internet privacy / Internet-related prefixes / Computer network security / Cyberwarfare / Computer security

REMARKS BY SPECIAL ASSISTANT TO THE PRESDENT AND WHITE HOUSE CYBERSECURITY COORDINATOR MICHAEL DANIEL Gartner Security and Risk Management Conference June 23, 2014 As Prepared for Delivery Good afternoon everyone. It’s

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2014-07-02 11:42:59
542Crime prevention / Cyberwarfare / Computer network security / Information security / Attack / Cyber-security regulation / Security / Computer security / National security

Dynamics and Equilibria of Information Security Investment Brian CARINI, Heinz School of Public Policy and Management Benoit MOREL, Engineering and Public Policy Carnegie Mellon University [removed]_, _bm1v@andre

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:15:35
543International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Cyber-security regulation / Computer security / National security / Public safety / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Security

At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-07-08 11:25:47
544Cyberwarfare / War / Military technology / National Cyber Security Alliance / Government / National Cyber Security Awareness Month / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / United States Department of Homeland Security / Hacking / Computer security

County/City/Town/Village/Other _______________________ Office of the Executive/Mayor/Other NAME OF County/City/Town/Village/Other WHEREAS, citizens, schools, libraries, businesses and other organizations use the Internet

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-08 00:18:31
545Military technology / Computer security / War / Military science / National Cyber Security Alliance / United States Department of Homeland Security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Hacking / Cyberwarfare / Electronic warfare

STATE/Territory of _______________________ Office of the Governor State Capitol, NAME OF State/Territory WHEREAS, citizens, schools, libraries, businesses and other organizations use the Internet for a variety of tasks,

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-08 00:18:32
546Computer network security / National Cyber Security Awareness Month / Cyberwarfare / National security / Cyber-security regulation / Computer security / Security / United States Department of Homeland Security

Enterprise Security and Risk Management Office Monthly Security Tips NEWSLETTER October 2013

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2013-10-15 15:00:25
547Computer security / Electronic warfare / Hacking / Military technology / National Cyber Security Awareness Month / National Cyber Security Alliance / United States Cyber Command / United States Computer Emergency Readiness Team / Cyber-security regulation / Security / United States Department of Homeland Security / Cyberwarfare

County/City/Town/Village/Other _______________________ Office of the Executive/Mayor/Other NAME OF County/City/Town/Village/Other WHEREAS, we recognize the vital role that technology has in our daily lives and in the fut

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-08 00:21:25
548Crime / Electronic warfare / Hacking / Military technology / War / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / Department of Defense Cyber Crime Center / Computer crimes / Cyberwarfare / Security

Seamus Reilly – Director EY – Information Security [removed[removed]Cyber Security

Add to Reading List

Source URL: www.iia.org.uk

Language: English - Date: 2014-05-27 06:38:44
549Hacking / Military technology / National Cyber Security Alliance / War / Government / National Cyber Security Awareness Month / Military science / Cyber-security regulation / Command /  Control and Interoperability Division / United States Department of Homeland Security / Cyberwarfare / Electronic warfare

STATE/Territory of _______________________ Office of the Governor State Capitol WHEREAS, we recognize the vital role that technology has in our daily lives and in the future of our Nation, whereby today many citizens, sc

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-09-20 14:21:36
550Electronic warfare / Hacking / Military technology / Cyberwarfare / National Cyber Security Alliance / United States Cyber Command / National Cyber Security Awareness Month / Computer security / Cyber-security regulation / Security / United States Department of Homeland Security / Military science

STATE/Territory of _______________________ Office of the Governor State Capitol WHEREAS, we recognize the vital role that technology has in our daily lives and in the future of our Nation, whereby today many citizens, sc

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-08 00:21:26
UPDATE