Accenture, "Secure Enterprise Network Consortium: Helping Provide Comprehensive Cyber Security Approaches for High Performance" (undated) |
N/A |
HTML |
Aliant, "Developing a Telecommunications Roadmap: Preparing for the promise of convergence" (undated) |
342 K |
PDF |
American Chemistry Council, ChemITC, "Making Strides to Improve Cyber Security in the Chemical Sector," 2009 Update, March 2009 |
94 K |
PDF |
American Chemistry Council, Christine Adams, untitled memorandum of the Chemical Sector Cyber Security Program’s responses to four questions from the White House 60-day Cyber Policy Review (undated) |
33 K |
PDF |
Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency, and Securities and Exchange Commission, "Interagency Paper on Sound Practices To Strengthen the Resilience of the U.S. Financial System," Federal Register, Volume 68, Number 70, April 18, 2003 |
149 K |
PDF |
Booz Allen Hamilton, "Commercial/Civil Cyber Community Snapshot" (undated) |
4,307 K |
PDF |
Booz Allen Hamilton, "National Cybersecurity Center Policy Capture" (undated) |
1,505 K |
PDF |
Brecht, Lyle A., Capital Markets Research, "National Cyber Systems Infrastructure Security Review Concept Paper," February 15, 2009 |
257 K |
PDF |
Business Executives for National Security, "Cyber Strategic Inquiry: Enabling Change Through a Strategic Simulation and Megacommunity Concept", December 2008 |
604 K |
PDF |
Business Executives for National Security, "Cybersecurity Roundtable, March 19, 2009, City Club, Washington DC," March 26, 2009 |
57 K |
PDF |
Business Software Alliance, "National Security & Homeland Security Councils Review of National Cyber Security Policy," March 19, 2009 |
47 K |
PDF |
Carnegie Mellon University, Lynn Robert Carter, "Computing Infrastructure Risk: Issue, Analysis, and Recommendation," December 23, 2008 |
218 K |
PDF |
Carnegie Mellon CyLab, Pradeep Khosla, "Information Security for the Next Century: Why we need an information-centric approach to data protection" (undated) |
194 K |
PDF |
Center for Applied Cybersecurity Research, Indiana University, Fred H. Cate, "Comments to the White House 60-Day Cybersecurity Review," March 27, 2009 |
209 K |
PDF |
Center for Democracy and Technology, "Comprehensive Privacy and Security: Critical for Health Information Technology," Version 1.0, May 2008 |
451 K |
PDF |
Center for Democracy and Technology, letter from Ari Schwartz and Gregory T. Nojeim, March 20, 2009 |
103 K |
PDF |
Center for Education and Research in Information Assurance and Security, Purdue University, presentation by Eugene Spafford entitled "NITRD Strategic Plan Forum," February 2009 |
778 K |
PDF |
Center for Infrastructure Protection, George Mason University, "The CIP Report," Volume 7, Number 8, February 2009 |
2,243 K |
PDF |
Center for National Security Studies, letter from Kate Martin, April 4, 2009 |
28 K |
PDF |
Center for Progressive Regulation, Rena Steinzor, "Democracies Die Behind Closed Doors: The Homeland Security Act and Corporate Accountability," March 12, 2003 |
256 K |
PDF |
Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency, "Securing Cyberspace for the 44th Presidency," December 2008 |
999 K |
PDF |
Center for the Development of Technological Leadership, University of Minnesota, presentation by S. Massoud Amin entitled "Smart Grid: Opportunities and Challenges Toward a Stronger and Smarter Grid" at the 2009 MIT Energy Conference – Accelerating Change in Global Energy, Cambridge, Massachusetts, March 6, 2009 |
2,642 K |
PDF |
Computing Research Association, paper by Stuart Zweben entitled "Computing Degree and Enrollment Trends: From the 2007-2008 CRA Taulbee Survey" (undated) |
454 K |
PDF |
Congressional Research Service, report by Harold C. Relyea entitled "The Executive Office of the President: An Historical Overview," updated November 26, 2008 |
N/A |
HTML |
Congressional Research Service, report by John Rollins and Anna C. Henning entitled "Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations," March 10, 2009 |
N/A |
HTML |
Davidson, Mary Ann, Oracle Corporation, "The Monroe Doctrine in Cyberspace", March 2009 |
39 K |
PDF |
Defense Advanced Research Projects Agency, "The National Cyber Range: A National Testbed for Critical Security Research" (undated) |
1,782 K |
PDF |
Department of Defense, "Defense Security Information Exchange (DSIE) A partnership for the Defense Industrial Base" (undated) |
24 K |
PDF |
Department of Health & Human Services, Office of the National Coordinator for Health Information technology, "The ONC-Coordinated Federal Health IT Strategic Plan: 2008-2012," June 3, 2008 |
N/A |
HTML |
Department of the Treasury, "2008 Update to Banking and Finance Sector-Specific Plan: Sector Profile and Goals" (undated) |
65 K |
PDF |
Department of the Treasury, "2008 Update to Banking and Finance Sector-Specific Plan: Appendix B: Statutory Authorities" (undated) |
331 K |
PDF |
Department of the Treasury, FSSCC/FBIIC Cyber Security Intelligence and Information Sharing Work Groups, "Roadmap for Improved Information Sharing: Situational Analysis and Recommendations for Action" (undated) |
122 K |
PDF |
Department of the Treasury, memorandum regarding 60-day cyber review questions (undated) |
50 K |
PDF |
Economist Intelligence Unit, The, "The means to compete: Benchmarking IT Industry Competitiveness", July 2007 |
153 K |
PDF |
Electronic Frontier Foundation, letter from Lee Tien and Peter Eckersley (undated) |
355 K |
PDF |
Financial Services Information Sharing and Analysis Center, letter from William B. Nelson, March 23, 2009 |
175 K |
PDF |
Gourley, Bob, Crucial Point LLC, "Cloud Computing and Cyber Defense," March 21, 2009 |
39 K |
PDF |
Gourley, Bob, Crucial Point LLC, "Open Source Software and Cyber Defense," March 30, 2009 |
142 K |
PDF |
Harper, Jim, Cato Institute, "Government-Run Cyber Security? No, Thanks," TechKnowledge Newsletter, Issue #123, March 13, 2009 |
N/A |
HTML |
Harris Interactive, "Online Security and Privacy Study", conducted on behalf of Microsoft and the National Cyber Security Alliance, March 2009 |
233 K |
PDF |
Information Systems Audit and Control Association, "IS Standards, Guidelines and Procedures for Auditing and Control Professionals," January 15, 2009 |
1,762 K |
PDF |
Information Technology Information Sharing and Analysis Center, letter from Brian Willis, February 27, 2009 |
1,203 K |
PDF |
Information Technology Sector Coordinating Council and Communications Sector Coordinating Council, "Response to White House Cyber Review Questions," March 20, 2009 |
174 K |
PDF |
Intelligence and National Security Alliance, "60 Day Cyber Study INSA Response," March 26, 2009 |
17 K |
PDF |
Intelligence and National Security Alliance, "Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment," March 26, 2009 |
433 K |
PDF |
Intelligence and National Security Alliance, "The Missing Link in U.S. Cybersecurity," March 21, 2009 |
33 K |
PDF |
Internet Security Alliance, "ISA Comments to Hathaway on creating an International Cyber Security Anchor Program" (undated) |
21 K |
PDF |
Internet Security Alliance, "ISA Initial Comments on Hathaway 60-Day review – a top 10 list of Cyber Principles" (undated) |
19 K |
PDF |
Internet Security Alliance, "The Cyber Security Social Contract Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information" (undated) |
302 K |
PDF |
Internet Security Alliance, "The Economic and Security Costs of Obsolescent Computer Laws" March 24, 2009 |
93 K |
PDF |
Internet Security Alliance, paper by Jeff Brown, Raytheon Company, entitled "A National Model for Cyber Protection Through Disrupting Attacker Command and Control Channels," March 2009 |
122 K |
PDF |
Internet Security Alliance, paper by Larry Clinton entitled "Cross cutting Issue #2 How Can we create public private partnerships that extend to action plans that work?" (undated) |
29 K |
PDF |
Internet Security Alliance, paper by Larry Clinton entitled "Cyber-Insurance Metrics and Impact on Cyber-Security" (undated) |
47 K |
PDF |
Internet Security Alliance, paper by Larry Clinton entitled "Issue Area 3: Norms of Behavior— Hathaway Questions" (undated) |
51 K |
PDF |
Internet Security Alliance, paper by Scott Borg entitled "Securing the Supply Chain for Electronic Equipment: A Strategy and Framework" (undated) |
31 K |
PDF |
Internet Security Alliance, paper by Sentar, Inc., "Position paper for Obama 60 Day review on Cyber Security: Utilization of Small Business (SBs) for Innovative Cyber Security Research and Development", March 26, 2009 |
17 K |
PDF |
Jackson, William, "Agency Award’Federal Aviation Administration: Protect and serve," Government Computer News, October 7, 2007 |
N/A |
HTML |
Kellermann, Tom, Core Security Technologies, "Proactive Public Policy per Cybersecurity," March 18, 2009 |
28 K |
PDF |
Kellermann, Tom, Core Security Technologies, "Red teaming idea in detail," March 11, 2009 |
11 K |
PDF |
Khater, Rami and Rachel Schaffer, Georgetown University, untitled memorandum, April 13, 2009 |
28 K |
PDF |
Markle Foundation, "Nation at Risk: Policy Makers Need Better Information to Protect the Country," March 10, 2009 |
455 K |
PDF |
National Association of State Chief Information Officers, NASCIO State CIO-CISO Cybersecurity Priorities Survey Summary, March 3, 2009 |
50 K |
PDF |
National Coordination Office for Networking and Information Technology Research and Development, Sally E. Howe, presentation entitled "Workshop Deliverables: Roadmap, Hard Problems, and Report" at the HCSS-Sponsored National Workshop on Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 8, 2008 |
755 K |
PDF |
National Cyber Forensics & Training Alliance and Cyber Initiative & Resource Fusion Unit, "Cyber Fusion Center, Pittsburgh, PA: Executive Briefing" (undated) |
3,202 K |
PDF |
National Cyber Security Alliance and Symantec, "NCSA-Symantec National Cyber Security Awareness Study: Newsworthy Analysis," October 2008 |
52 K |
PDF |
National Cyber Security Alliance, "National Cyber Security Alliance in Brief" (undated) |
122 K |
PDF |
National Research Council, report edited by Robert W. Lucky and Jon Eisenberg entitled "Renewing U.S. Telecommunications Research," 2006 |
N/A |
HTML |
National Science and Technology Council, Subcommittee on Biometrics and Identity Management, "Identity Management Task Force Report 2008," 2008 |
2,959 K |
PDF |
National Science Foundation, "Notes for White House 60-day Cyber-Policy Review," March 25, 2009 |
151 K |
PDF |
National Science Foundation, "NSF Security Program Overview," March 26, 2009 |
3,290 K |
PDF |
National Science Foundation, "Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009," March 31, 2009 |
128 K |
PDF |
National Security Telecommunications Advisory Committee, "NSTAC Response to the Sixty-Day Cyber Study Group," March 12, 2009 |
190 K |
PDF |
Networking and Information Technology Research and Development Program, High Confidence Software and Systems Coordinating Group, "High-Confidence Medical Devices: Cyber-Physical Systems for 21st Century Health Care," February 2009 |
1,341 K |
PDF |
Office of the Director of National Intelligence, Joint Interagency Cyber Task Force, Steven R.Chabinsky, presentation entitled "Intrusion Detection and Prevention (What, Where, How and Who)" (undated) |
40 K |
PDF |
Pederson, Perry, Wurldtech Labs, "Project Aurora and the Smart Grid" (undated) |
491 K |
PDF |
Pinkney, Kevin R., "Putting Blame Where Blame is Due: Software Manufacturer and Customer Liability for Security-related Software Failure," Albany Law Journal of Science & Technology, Volume 13, 2002 |
N/A |
HTML |
Raduege, Harry D., Jr., "Evolving Cybersecurity Faces a New Dawn," SIGNAL Magazine, December 2008 |
115 K |
PDF |
Raduege, Harry D., Jr., "Future Defense Department Cybersecurity Builds on the Past," SIGNAL Magazine, February 08 |
116 K |
PDF |
SANS Institute, "The United States Cyber Challenge," May 8, 2009 |
174 K |
PDF |
Schneider, Fred B., and Birman, Kenneth P., Cornell University, "The Monoculture Risk put into Context," IEEE Security & Privacy, January/February 2009 |
453 K |
PDF |
Spoonamore, Stephen and Ronald L. Krutz, "Smart Grid and Cyber Challenges: National Security Risks and Concerns of Smart Grid", March 2009 |
174 K |
PDF |
SRI International, Computer Science Laboratory, technical report addendum by Phillip Porras, Hassen Saidi, and Vinod Yegneswaran entitled "Conficker C Analysis," March 19, 2009 |
N/A |
HTML |
TechAmerica, "TechAmerica Response to 60-Day Cyber Security Review," March 2009 |
202 K |
PDF |
Trevithick, Paul, William Coleman, John Clippinger, and Kim Taipale, "Identity and Resilience" (undated) |
43 K |
PDF |
U.S. Chamber of Commerce, letter from Ann Beauchesne, March 27, 2009 |
176 K |
PDF |
United States Congress, American Recovery and Reinvesment Act of 2009, Public Law 111-5 |
1,198 K |
PDF |
United States Congress, Year 2000 Information and Readiness Disclosure Act, Public Law 105-271 |
181 K |
PDF |
United States Government Accountability Office, David A. Powner, "Information Technology: Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector Information Technology Systems and Data in Critical Infrastructure Sectors," September 16, 2008 |
1,018 K |
PDF |
United States House of Representatives, 111th Congress, "A bill to authorize the Secretary of Homeland Security to establish a program to award grants to institutions of higher education for the establishment or expansion of cybersecurity professional development programs, and for other purposes." (H.R.266), as introduced in the House, January 7, 2009 |
168 K |
PDF |
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, "Status of US Strategic Programs," March 17, 2009 |
243 K |
PDF |
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, "Statement of General Kevin P. Chilton, Commander, United States Strategic Command," March 17, 2009 |
43 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of Chairman Bennie G. Thompson, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009 |
43 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Testimony of Amit Yoran, Netwitness Corporation, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009 |
179 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Federal Cybersecurity Mission," March 10, 2009 |
140 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement for the Record of Seán P. McGurk, Director, Control Systems Security Program, National Cyber Security Division, National Protection and Programs Directorate, Department of Homeland Security," March 24, 2009 |
20 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, "Statement of Chairwoman Yvette D. Clarke," March 10, 2009 |
24 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of David Powner, Director, Information Technology Management Issues, United States Government Accountability Office, ‘National Cybersecurity Strategy: Key Improvements are Needed to Strengthen the Nation’s Posture,’" March 10, 2009 |
275 K |
PDF |
United States House of representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Statement of James A. Lewis, Center for Strategic and International Studies, ‘Reviewing the Federal Cybersecurity Mission,’" March 10, 2009 |
60 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, "Testimony of Mary Ann Davidson, Chief Security Officer, Oracle Corporation," March 10, 2009 |
31 K |
PDF |
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, "Written Testimony of Scott Charney, Corporate Vice President, Microsoft Corporation’s Trustworthy Computing, ‘Securing America’s Cyber Future: Simplify, Organize and Act,’" March 10, 2009 |
567 K |
PDF |
United States House of Representatives, hearing before the Committee on Science and Technology, "Statement of Dr. Christopher L. Greer, Director, National Coordination Office for Networking and Information Technology Research and Development," April 1, 2009 |
1,987 K |
PDF |
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, "Statement of James C. May, President and CEO, Air Transport Association of America, Inc., ‘Air Traffic Control Modernization and NextGen: Near-Term Achievable Goals,’" March 18, 2009 |
289 K |
PDF |
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, "Statement of The Honorable Calvin L. Scovel III, Inspector General, U.S. Department of Transportation, ‘Federal Aviation Administration: Actions Needed to Achieve Mid-term NextGen Goals,’" March 18, 2009 |
119 K |
PDF |
United States House of Representatives, hearing before the Permanent Select Committee on Intelligence, "Annual Threat Assessment" by Dennis C. Blair, Director of National Intelligence, February 25, 2009 |
168 K |
PDF |
United States House of Representatives, Permanent Select Committee on Intelligence, "HPSCI White Paper on Cyber security," December 10, 2008 |
45 K |
PDF |
United States Secret Service, memorandum entitled "Electronic Crime task Forces (ECTF)" (undated) |
18 K |
PDF |
United States Senate, 111th Congress, Senate Bill S.773, "Cybersecurity Act of 2009", as introduced in the Senate, April 1, 2009 |
N/A |
HTML |
United States Senate, 111th Congress, Senate Bill S.778, "A bill to establish, within the Executive Office of the President, the Office of the National Cybersecurity Advisor", as introduced in the Senate, April 1, 2009 |
N/A |
HTML |
United States Senate, hearing before the Committee on Energy and Natural Resources, "Questions for Patrick Gallagher, National Institute of Standards and Technology," March 3, 2009 |
136 K |
PDF |
United States Senate, hearing before the Committee on Energy and Natural Resources, "Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability, U.S. Department of Energy," March 3, 2009 |
136 K |
PDF |
United States Senate, hearing before the Committee on Energy and Natural Resources "Testimony of Patrick D. Gallagher, Ph.D., Deputy Director, National Institute of Standards and Technology, United States Department of Commerce," March 3, 2009 |
118 K |
PDF |
Vijayan, Jaikumar, "PCI security standard gets flayed at House hearing," Computerworld, April 1, 2009 |
N/A |
HTML |