Found 27 datasets matching "Cyber Security".
-
... The Director of the Office of Science and Technology Policy then provided a formal charge, asking PITAC members to concentrate their efforts on the focus, balance, and affectiveness of...
Search relevance: 233.81 | Views last month: 1 -
Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing systems and predominantly closed...
Search relevance: 139.19 | Views last month: 0 -
On June 4-6, 2019, the National Information Technology and Networking Research and Development (NITRD) Program's Artificial Intelligence Research and Development (R&D) and Cyber Security and...
Search relevance: 102.47 | Views last month: 43 -
The President`s Cyberspace Policy Review challenges the Federal community to develop a framework for research and development strategies that focus on game-changing technologies that can...
Search relevance: 99.83 | Views last month: 1 -
This document provides FY2021 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 93.49 | Views last month: 1 -
This document provides FY2019 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 92.46 | Views last month: 3 -
This document provides FY2020 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 92.46 | Views last month: 1 -
The National Institute of Standards and Technology (NIST) provides a Cybersecurity Framework (CSF) for benchmarking and measuring the maturity level of cybersecurity programs across all...
Search relevance: 84.95 | Views last month: 0 -
The Computer Forensics Tool Testing Program is a project in The Software and Systems Division supported by the Special Programs Office and the Department of Homeland Security. Through the Cyber...
Search relevance: 76.17 | Views last month: 5 -
Leadership, Diversity & Inclusion and Cyber Security eBook Collections.
Search relevance: 76.04 | Views last month: 0 -
Computer security educational material and assignments featuring automated testing.Security Invite automates testing of assignments independent of the tools used for development, interface, and...
Search relevance: 68.81 | Views last month: 1 -
Audit log of database transactions taking place within Mobius. This is used by the Security Operations Center to help determine the cyber health of our system
Search relevance: 67.36 | Views last month: 2 -
The U.S. Department of Energy’s Office of Intelligence and Counterintelligence is responsible for all intelligence and counterintelligence activities throughout the DOE complex, including nearly...
Search relevance: 66.67 | Views last month: 6 -
Audit log of transactions taking place within Mobius. This is used by the Security Operations Center to help determine the cyber health of our system
Search relevance: 66.57 | Views last month: 6 -
The CSRIC Best Practices Search Tool allows you to search CSRIC's collection of Best Practices using a variety of criteria including Network Type, Industry Role, Keywords, Priority Levels, and BP...
Search relevance: 65.61 | Views last month: 9 -
The purpose of this mapping is to provide the relationship between NIST Cybersecurity Framework (CSF) v1.1 and the NERC Critical Infrastructure Protection (CIP) Standards.Target Audience:The...
Search relevance: 60.06 | Views last month: 6 -
This document provides FY 2023 implementation plans for the 2019 Federal Cybersecurity Research and Development Strategic Plan (Plan), developed by the Networking and Information Technology...
Search relevance: 50.48 | Views last month: 1 -
This document provides FY2022 implementation plans for the 2019 Federal Cybersecurity Research and Development Strategic Plan (Plan), developed by the Networking and Information Technology...
Search relevance: 49.72 | Views last month: 0 -
This page provides information for the Cybersecurity performance measure.
Search relevance: 49.61 | Views last month: 1