United States

     An overview of United States’ cyber policy landscape is available on the UNIDIR Cyber Policy Portal here

This country/territory is in North America
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 10-18 of 24 results

   
   
Publication

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

Authors

Year

  • 2019

Description

  • The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity an…

 

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) developed “A Guide to Critical Infrastructure Security and Resilience” guide to serve as an overview of the U.S.  all-hazards approach to critical infrastructure security and resilience.  It is intended for both […]

Publication

NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA

Authors

Year

  • 2013

Description

  • This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastruct…

 

NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA

This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience.

Publication

Ransomware | CISA & MS-ISAC

Authors

Year

  • 2021

Description

  • Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any …

 

Ransomware | CISA & MS-ISAC

Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if […]

Publication

CISA Global | CISA

Authors

Year

  • 2021

Description

  • CISA Global outlines how CISA will work with international partners to fulfill our responsibilities,…

 

CISA Global | CISA

CISA Global outlines how CISA will work with international partners to fulfill our responsibilities, execute our work, and create unity of effort within our mission areas. The strategy details CISA’s international vision and commits the agency to four goals: Advancing operational cooperation; Building partner capacity; Strengthening collaboration through stakeholder engagement […]

Publication

Cyber Threat Intelligence Sharing

Authors

Year

  • 2021

Description

  • Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of…

 

Cyber Threat Intelligence Sharing

Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of projects to help Commonwealth countries improve their cyber security capacity. This document explains work towards platforms to share information on cyber security domestically, regionally and globally, and across sectors. It aims to enable businesses and other organisations […]

Tool

CyberSeek

Authors

Year

  • 2016

Description

  • To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about suppl…

 

CyberSeek

To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. However, there is a dangerous shortage of cybersecurity workers in the United States […]

Publication

Improving Cybersecurity Awareness in Underserved Populations

Authors

Year

  • 2019

Description

  • This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highli…

 

Improving Cybersecurity Awareness in Underserved Populations

This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than-average risks of being victims of cyber attacks. They are less likely to know whether they have even been […]

Publication

Cybersecurity Workforce Development: A Primer

Authors

Year

  • 2018

Description

  • This report unpacks the many issues and questions that collectively make up “the cybersecurity wor…

 

Cybersecurity Workforce Development: A Primer

This report unpacks the many issues and questions that collectively make up “the cybersecurity workforce development challenge” in the United States. Our aim is to inform the discussion, make the case that the challenge warrants policy intervention, and highlight areas ripe for further research and policy intervention. We argue that […]

Publication

Cyber Maturity in the Asia-Pacific Region (2017)

Authors

Year

  • 2017

Description

  • This report assesses the national approach of Asia–Pacific countries to the challenges and opportu…

 

Cyber Maturity in the Asia-Pacific Region (2017)

This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues. The 2017 report is the fourth annual […]

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.