Organizations of all types and sizes are vulnerable to insider threats—from family-owned small businesses to Fortune 100 corporations, local and state governments, and public infrastructure to...
Tag: CISA
CISO Strategics CISO2CISO Notepad Series Cybersecurity Strategic Plan TOP Featured Post User most voted post
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
PURPOSE This Strategic Plan communicates the Cybersecurity and Infrastructure Security Agency’s (CISA) mission and vision, promotes unity of effort across the agency and our partners, and...
SECURING THE SOFTWARE SUPPLY CHAIN – RECOMMENDED PRACTICES GUIDE FOR DEVELOPERS
Executive SummaryCyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for thepurpose of disrupting, disabling, destroying, or maliciously controlling a computing environment orinfrastructure;...
CISA INSIGHTS – Preparing Critical Infrastructure for Post-Quantum Cryptography
Quantum Risk to Digital CommunicationsNation-states and private companies are actively pursuing the capabilities of quantum computers. Quantum computing opens up exciting new possibilities; however, the consequences...
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policyframework of computer security guidance for how private sector organizations in the United States...
CISA Cybersecurity Incident and Vulnerability Response Playbooks
Operational Procedures for Planning and Conducting Cybersecurity Incident and VulnerabilityResponse Activities in FCEB Information Systems. INTRODUCTIONThe Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading...
CISA 5G Security Evaluation Process Investigation v1
EXECUTIVE SUMMARY Standards for Phases 1 and 2 of fifth generation (5G) cellular network technology are complete andcellular operators now are rolling out 5G services. Federal...
Cloud Security Technical Reference Architecture
Coauthored by:Cybersecurity and Infrastructure Security Agency,United States Digital Service, andFederal Risk and Authorization Management Program The purpose of the Cloud Security Technical Reference Architecture is to...