Found 13 datasets matching filters.
-
- Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the...
Search relevance: 1.00 | Views last month: 49 | Published on: 2026-03-14 -
Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the...
Search relevance: 1.00 | Views last month: 16 | Published on: 2026-03-14 -
The HireVue platform provides a virtual capability component to support face-to face interviews, online messaging capabilities, video chat recording, virtual informational booth areas for...
Search relevance: 1.00 | Views last month: 9 | Published on: 2025-08-02 -
This document provides FY2019 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 3 | Published on: 2025-08-02 -
High-level summary of all Services in the Catalog, filterable and searchable by parameterization. May be viewed in Tiles/Cards format or in List format. Catalog includes detailed information about...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-09-01 -
This document provides FY2020 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-08-02 -
... The Director of the Office of Science and Technology Policy then provided a formal charge, asking PITAC members to concentrate their efforts on the focus, balance, and affectiveness of...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-08-02 -
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program defines a set of interrelated priorities for the agencies of the U.S. government that conduct...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-08-02 -
The President`s Cyberspace Policy Review challenges the Federal community to develop a framework for research and development strategies that focus on game-changing technologies that can...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-08-02 -
This document provides FY2021 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 1 | Published on: 2025-08-02 -
The NITRD workshop on Tailored Trustworthy Spaces: Solutions for the Smart Grid was conceived by the Federal government to probe deeper into how Tailored Trustworthy Spaces, a strategic Federal...
Search relevance: 1.00 | Views last month: 0 | Published on: 2025-08-02 -
To implement the Secretary's authority in 6 U.S.C. 658 which allows for the Cybersecurity Talent Management Systems (CTMS), the Department of Homeland Security (DHS) must build and maintain a team...
Search relevance: 1.00 | Views last month: 0 | Published on: 2025-08-02 -
Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing systems and predominantly closed...
Search relevance: 1.00 | Views last month: 0 | Published on: 2025-08-02