Cyberspace Policy Review

Documents

Size

File Format

Accenture, "Secure Enterprise Network Consortium: Helping Provide Comprehensive Cyber Security Approaches for High Performance" (undated) N/A HTML
Aliant, "Developing a Telecommunications Roadmap: Preparing for the promise of convergence" (undated) 342 K PDF
American Chemistry Council, ChemITC, "Making Strides to Improve Cyber Security in the Chemical Sector," 2009 Update, March 2009 94 K PDF
American Chemistry Council, Christine Adams, untitled memorandum of the Chemical Sector Cyber Security Program’s responses to four questions from the White House 60-day Cyber Policy Review (undated) 33 K PDF
Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency, and Securities and Exchange Commission, "Interagency Paper on Sound Practices To Strengthen the Resilience of the U.S. Financial System," Federal Register, Volume 68, Number 70, April 18, 2003 149 K PDF
Booz Allen Hamilton, "Commercial/Civil Cyber Community Snapshot" (undated) 4,307 K PDF
Booz Allen Hamilton, "National Cybersecurity Center Policy Capture" (undated) 1,505 K PDF
Brecht, Lyle A., Capital Markets Research, "National Cyber Systems Infrastructure Security Review Concept Paper," February 15, 2009 257 K PDF
Business Executives for National Security, "Cyber Strategic Inquiry: Enabling Change Through a Strategic Simulation and Megacommunity Concept", December 2008 604 K PDF
Business Executives for National Security, "Cybersecurity Roundtable, March 19, 2009, City Club, Washington DC," March 26, 2009 57 K PDF
Business Software Alliance, "National Security & Homeland Security Councils Review of National Cyber Security Policy," March 19, 2009 47 K PDF
Carnegie Mellon University, Lynn Robert Carter, "Computing Infrastructure Risk: Issue, Analysis, and Recommendation," December 23, 2008 218 K PDF
Carnegie Mellon CyLab, Pradeep Khosla, "Information Security for the Next Century: Why we need an information-centric approach to data protection" (undated) 194 K PDF
Center for Applied Cybersecurity Research, Indiana University, Fred H. Cate, "Comments to the White House 60-Day Cybersecurity Review," March 27, 2009 209 K PDF
Center for Democracy and Technology, "Comprehensive Privacy and Security: Critical for Health Information Technology," Version 1.0, May 2008 451 K PDF
Center for Democracy and Technology, letter from Ari Schwartz and Gregory T. Nojeim, March 20, 2009 103 K PDF
Center for Education and Research in Information Assurance and Security, Purdue University, presentation by Eugene Spafford entitled "NITRD Strategic Plan Forum," February 2009 778 K PDF
Center for Infrastructure Protection, George Mason University, "The CIP Report," Volume 7, Number 8, February 2009 2,243 K PDF
Center for National Security Studies, letter from Kate Martin, April 4, 2009 28 K PDF
Center for Progressive Regulation, Rena Steinzor, "Democracies Die Behind Closed Doors: The Homeland Security Act and Corporate Accountability," March 12, 2003  256 K PDF
Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency, "Securing Cyberspace for the 44th Presidency," December 2008 999 K PDF
Center for the Development of Technological Leadership, University of Minnesota, presentation by S. Massoud Amin entitled "Smart Grid: Opportunities and Challenges Toward a Stronger and Smarter Grid" at the 2009 MIT Energy Conference – Accelerating Change in Global Energy, Cambridge, Massachusetts, March 6, 2009 2,642 K PDF
Computing Research Association, paper by Stuart Zweben entitled "Computing Degree and Enrollment Trends: From the 2007-2008 CRA Taulbee Survey" (undated) 454 K PDF
Congressional Research Service, report by Harold C. Relyea entitled "The Executive Office of the President: An Historical Overview," updated November 26, 2008 N/A HTML
Congressional Research Service, report by John Rollins and Anna C. Henning entitled "Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations," March 10, 2009  N/A HTML
Davidson, Mary Ann, Oracle Corporation, "The Monroe Doctrine in Cyberspace", March 2009 39 K PDF
Defense Advanced Research Projects Agency, "The National Cyber Range: A National Testbed for Critical Security Research" (undated) 1,782 K PDF
Department of Defense, "Defense Security Information Exchange (DSIE) A partnership for the Defense Industrial Base" (undated) 24 K PDF
Department of Health & Human Services, Office of the National Coordinator for Health Information technology, "The ONC-Coordinated Federal Health IT Strategic Plan: 2008-2012," June 3, 2008  N/A HTML
Department of the Treasury, "2008 Update to Banking and Finance Sector-Specific Plan: Sector Profile and Goals" (undated)  65 K PDF
Department of the Treasury, "2008 Update to Banking and Finance Sector-Specific Plan: Appendix B: Statutory Authorities" (undated)  331 K PDF
Department of the Treasury, FSSCC/FBIIC Cyber Security Intelligence and Information Sharing Work Groups, "Roadmap for Improved Information Sharing: Situational Analysis and Recommendations for Action" (undated) 122 K PDF
Department of the Treasury, memorandum regarding 60-day cyber review questions (undated)  50 K PDF
Economist Intelligence Unit, The, "The means to compete: Benchmarking IT Industry Competitiveness", July 2007 153 K PDF
Electronic Frontier Foundation, letter from Lee Tien and Peter Eckersley (undated)  355 K PDF
Financial Services Information Sharing and Analysis Center, letter from William B. Nelson, March 23, 2009  175 K PDF
Gourley, Bob, Crucial Point LLC, "Cloud Computing and Cyber Defense," March 21, 2009 39 K PDF
Gourley, Bob, Crucial Point LLC, "Open Source Software and Cyber Defense," March 30, 2009 142 K PDF
Harper, Jim, Cato Institute, "Government-Run Cyber Security? No, Thanks," TechKnowledge Newsletter, Issue #123, March 13, 2009  N/A HTML
Harris Interactive, "Online Security and Privacy Study", conducted on behalf of Microsoft and the National Cyber Security Alliance, March 2009  233 K PDF
Information Systems Audit and Control Association, "IS Standards, Guidelines and Procedures for Auditing and Control Professionals," January 15, 2009 1,762 K PDF
Information Technology Information Sharing and Analysis Center, letter from Brian Willis, February 27, 2009 1,203 K PDF
Information Technology Sector Coordinating Council and Communications Sector Coordinating Council, "Response to White House Cyber Review Questions," March 20, 2009  174 K PDF
Intelligence and National Security Alliance, "60 Day Cyber Study INSA Response," March 26, 2009  17 K PDF
Intelligence and National Security Alliance, "Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment," March 26, 2009 433 K PDF
Intelligence and National Security Alliance, "The Missing Link in U.S. Cybersecurity," March 21, 2009 33 K PDF
Internet Security Alliance, "ISA Comments to Hathaway on creating an International Cyber Security Anchor Program" (undated) 21 K PDF
Internet Security Alliance, "ISA Initial Comments on Hathaway 60-Day review – a top 10 list of Cyber Principles" (undated) 19 K PDF
Internet Security Alliance, "The Cyber Security Social Contract Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information" (undated) 302 K PDF
Internet Security Alliance, "The Economic and Security Costs of Obsolescent Computer Laws" March 24, 2009  93 K PDF
Internet Security Alliance, paper by Jeff Brown, Raytheon Company, entitled "A National Model for Cyber Protection Through Disrupting Attacker Command and Control Channels," March 2009 122 K PDF
Internet Security Alliance, paper by Larry Clinton entitled "Cross cutting Issue #2 How Can we create public private partnerships that extend to action plans that work?" (undated)  29 K PDF
Internet Security Alliance, paper by Larry Clinton entitled "Cyber-Insurance Metrics and Impact on Cyber-Security" (undated)  47 K PDF
Internet Security Alliance, paper by Larry Clinton entitled "Issue Area 3: Norms of Behavior— Hathaway Questions" (undated)  51 K PDF
Internet Security Alliance, paper by Scott Borg entitled "Securing the Supply Chain for Electronic Equipment: A Strategy and Framework" (undated)  31 K PDF
Internet Security Alliance, paper by Sentar, Inc., "Position paper for Obama 60 Day review on Cyber Security: Utilization of Small Business (SBs) for Innovative Cyber Security Research and Development", March 26, 2009 17 K PDF
Jackson, William, "Agency Award’Federal Aviation Administration: Protect and serve," Government Computer News, October 7, 2007 N/A HTML
Kellermann, Tom, Core Security Technologies, "Proactive Public Policy per Cybersecurity," March 18, 2009  28 K PDF
Kellermann, Tom, Core Security Technologies, "Red teaming idea in detail," March 11, 2009  11 K PDF
Khater, Rami and Rachel Schaffer, Georgetown University, untitled memorandum, April 13, 2009  28 K PDF
Markle Foundation, "Nation at Risk: Policy Makers Need Better Information to Protect the Country," March 10, 2009  455 K PDF
National Association of State Chief Information Officers, NASCIO State CIO-CISO Cybersecurity Priorities Survey Summary, March 3, 2009  50 K PDF
National Coordination Office for Networking and Information Technology Research and Development, Sally E. Howe, presentation entitled "Workshop Deliverables: Roadmap, Hard Problems, and Report" at the HCSS-Sponsored National Workshop on Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 8, 2008 755 K PDF
National Cyber Forensics & Training Alliance and Cyber Initiative & Resource Fusion Unit, "Cyber Fusion Center, Pittsburgh, PA: Executive Briefing" (undated)  3,202 K PDF
National Cyber Security Alliance and Symantec, "NCSA-Symantec National Cyber Security Awareness Study: Newsworthy Analysis," October 2008 52 K PDF
National Cyber Security Alliance, "National Cyber Security Alliance in Brief" (undated) 122 K PDF
National Research Council, report edited by Robert W. Lucky and Jon Eisenberg entitled "Renewing U.S. Telecommunications Research," 2006 N/A HTML
National Science and Technology Council, Subcommittee on Biometrics and Identity Management, "Identity Management Task Force Report 2008," 2008 2,959 K  PDF
National Science Foundation, "Notes for White House 60-day Cyber-Policy Review," March 25, 2009  151 K PDF
National Science Foundation, "NSF Security Program Overview," March 26, 2009 3,290 K PDF
National Science Foundation, "Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009," March 31, 2009  128 K PDF
National Security Telecommunications Advisory Committee, "NSTAC Response to the Sixty-Day Cyber Study Group," March 12, 2009  190 K PDF
Networking and Information Technology Research and Development Program, High Confidence Software and Systems Coordinating Group, "High-Confidence Medical Devices: Cyber-Physical Systems for 21st Century Health Care," February 2009 1,341 K PDF
Office of the Director of National Intelligence, Joint Interagency Cyber Task Force, Steven R.Chabinsky, presentation entitled "Intrusion Detection and Prevention (What, Where, How and Who)" (undated)  40 K PDF
Pederson, Perry, Wurldtech Labs, "Project Aurora and the Smart Grid" (undated)  491 K PDF
Pinkney, Kevin R., "Putting Blame Where Blame is Due: Software Manufacturer and Customer Liability for Security-related Software Failure," Albany Law Journal of Science & Technology, Volume 13, 2002  N/A HTML
Raduege, Harry D., Jr., "Evolving Cybersecurity Faces a New Dawn," SIGNAL Magazine, December 2008  115 K PDF
Raduege, Harry D., Jr., "Future Defense Department Cybersecurity Builds on the Past," SIGNAL Magazine, February 08  116 K PDF
SANS Institute, "The United States Cyber Challenge," May 8, 2009  174 K PDF
Schneider, Fred B., and Birman, Kenneth P., Cornell University, "The Monoculture Risk put into Context," IEEE Security & Privacy, January/February 2009  453 K PDF
Spoonamore, Stephen and Ronald L. Krutz, "Smart Grid and Cyber Challenges: National Security Risks and Concerns of Smart Grid", March 2009  174 K PDF
SRI International, Computer Science Laboratory, technical report addendum by Phillip Porras, Hassen Saidi, and Vinod Yegneswaran entitled "Conficker C Analysis," March 19, 2009  N/A HTML
TechAmerica, "TechAmerica Response to 60-Day Cyber Security Review," March 2009  202 K PDF
Trevithick, Paul, William Coleman, John Clippinger, and Kim Taipale, "Identity and Resilience" (undated)  43 K PDF
U.S. Chamber of Commerce, letter from Ann Beauchesne, March 27, 2009  176 K PDF
United States Congress, American Recovery and Reinvesment Act of 2009, Public Law 111-5  1,198 K PDF
United States Congress, Year 2000 Information and Readiness Disclosure Act, Public Law 105-271   181 K PDF
United States Government Accountability Office, David A. Powner, "Information Technology: Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector Information Technology Systems and Data in Critical Infrastructure Sectors," September 16, 2008   1,018 K PDF
United States House of Representatives, 111th Congress, "A bill to authorize the Secretary of Homeland Security to establish a program to award grants to institutions of higher education for the establishment or expansion of cybersecurity professional development programs, and for other purposes." (H.R.266), as introduced in the House, January 7, 2009  168 K PDF
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, "Status of US Strategic Programs," March 17, 2009  243 K PDF
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, "Statement of General Kevin P. Chilton, Commander, United States Strategic Command," March 17, 2009   43 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of Chairman Bennie G. Thompson, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009  43 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Testimony of Amit Yoran, Netwitness Corporation, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009  179 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Federal Cybersecurity Mission," March 10, 2009  140 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement for the Record of Seán P. McGurk, Director, Control Systems Security Program, National Cyber Security Division, National Protection and Programs Directorate, Department of Homeland Security," March 24, 2009  20 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, "Statement of Chairwoman Yvette D. Clarke," March 10, 2009 24 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of David Powner, Director, Information Technology Management Issues, United States Government Accountability Office, ‘National Cybersecurity Strategy: Key Improvements are Needed to Strengthen the Nation’s Posture,’" March 10, 2009  275 K PDF
United States House of representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of James A. Lewis, Center for Strategic and International Studies, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009 60 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Testimony of Mary Ann Davidson, Chief Security Officer, Oracle Corporation," March 10, 2009 31 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, "Written Testimony of Scott Charney, Corporate Vice President, Microsoft Corporation’s Trustworthy Computing, ‘Securing America’s Cyber Future: Simplify, Organize and Act,’" March 10, 2009 567 K PDF
United States House of Representatives, hearing before the Committee on Science and Technology, "Statement of Dr. Christopher L. Greer, Director, National Coordination Office for Networking and Information Technology Research and Development," April 1, 2009 1,987 K PDF
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, "Statement of James C. May, President and CEO, Air Transport Association of America, Inc., ‘Air Traffic Control Modernization and NextGen: Near-Term Achievable Goals,’" March 18, 2009 289 K PDF
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, "Statement of The Honorable Calvin L. Scovel III, Inspector General, U.S. Department of Transportation, ‘Federal Aviation Administration: Actions Needed to Achieve Mid-term NextGen Goals,’" March 18, 2009 119 K PDF
United States House of Representatives, hearing before the Permanent Select Committee on Intelligence, "Annual Threat Assessment" by Dennis C. Blair, Director of National Intelligence, February 25, 2009 168 K PDF
United States House of Representatives, Permanent Select Committee on Intelligence, "HPSCI White Paper on Cyber security," December 10, 2008 45 K PDF
United States Secret Service, memorandum entitled "Electronic Crime task Forces (ECTF)" (undated) 18  K PDF
United States Senate, 111th Congress, Senate Bill S.773, "Cybersecurity Act of 2009", as introduced in the Senate, April 1, 2009 N/A HTML
United States Senate, 111th Congress, Senate Bill S.778, "A bill to establish, within the Executive Office of the President, the Office of the National Cybersecurity Advisor", as introduced in the Senate, April 1, 2009 N/A HTML
United States Senate, hearing before the Committee on Energy and Natural Resources, "Questions for Patrick Gallagher, National Institute of Standards and Technology," March 3, 2009 136 K PDF
United States Senate, hearing before the Committee on Energy and Natural Resources, "Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability, U.S. Department of Energy," March 3, 2009 136 K PDF
United States Senate, hearing before the Committee on Energy and Natural Resources "Testimony of Patrick D. Gallagher, Ph.D., Deputy Director, National Institute of Standards and Technology, United States Department of Commerce," March 3, 2009 118 K PDF
Vijayan, Jaikumar, "PCI security standard gets flayed at House hearing," Computerworld, April 1, 2009 N/A HTML