National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
51Cyberwarfare / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Computer crimes / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Government / Library of Congress / Computer network security

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-10-27 14:38:53
52Cyberwarfare / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Computer crimes / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Government / Library of Congress / Computer network security

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-10-27 14:38:59
53Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:18:12
54Computer security / United States Department of Homeland Security / Computer crimes / Secure communication / National Strategy for Trusted Identities in Cyberspace / National Cyber Security Division / Cyber-security regulation / Computer network security / Cyberwarfare / Security

THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 3, 2011

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:33:00
55Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-11-05 09:56:00
56Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 HIT Policy Committee Privacy and Security Tiger Team Transmittal Letter

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-04-03 11:08:11
57Security / Public safety / Computer network security / National security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / National Strategy for Trusted Identities in Cyberspace / Comprehensive National Cybersecurity Initiative / Cyberspace / Cyberwarfare / United States Department of Homeland Security / Computer security

Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-12-14 07:44:24
58Computer network security / Crime prevention / National security / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / Information security / National Cybersecurity Center / Security / Computer security / Cyberwarfare

Testimony of Donna F. Dodson Chief Cybersecurity Advisor National Institute of Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-03-26 10:58:55
59Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-03-06 12:33:10
60Computer crimes / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computing / Federal Information Security Management Act / National Institute of Standards and Technology / National Cybersecurity Center / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer security / United States Department of Homeland Security

Testimony of Patrick D. Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2013-06-14 11:46:47
UPDATE