Back to Results
First PageMeta Content
Cyberwarfare / Computer security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National security / Cyber-security regulation / Federal Information Security Management Act / United States Department of Homeland Security / Risk management / Security / Public safety / Computer crimes


Creating an Adaptive Cybersecurity Culture Through the Agile Cybersecurity Action Plan (ACAP) John W. Link & Jo Lee Loveland Link
Add to Reading List

Document Date: 2015-01-08 11:32:07


Open Document

File Size: 811,41 KB

Share Result on Facebook

Company

Risk Subgroup / Organization / Facilitated Process- The ACAP Steering Group / Risk Management / PayPal / Federal Information Systems / Steering Group / ACAP Steering Group / Risk Portfolio / /

Country

United States / /

Facility

The National Institute of Standards and Technology / /

IndustryTerm

retail attacks / narrow technology fixes / tried-and-true former solutions / technology acquisition / technology changes / leadership / Underground technology development / computing / responsive solutions / technology developments / technology change / offensive technology / /

Organization

National Institute of Standards and Technology / Strategic Mission / Operational Command / National Cybersecurity Standards Department of Homeland Security / Governance Structure / MIT / Harvard / Center for Strategic and International Studies / office of Management and Budget / Department of Defense / Define Cybersecurity Mission / /

Person

Dorothy A. Leonard / Emerita / John W. Link / Jo Lee Loveland / James Lewis / /

Position

Organizational Culture Specialist / actor / Professor / President / future-forward / adaptive management / Representative / director of the Technology and Public Policy Program / commentator / CTO / and CIO / /

Product

Baseline Cybersecurity Threat / /

PublishedMedium

The ACAP Process Review / /

Region

Eastern Europe / /

Technology

urgent and vulnerable Information Technology / Knowledge Management / Information Technology / Cybersecurity technology / 5.5 Cybersecurity Technology / Network Operations Center / /

SocialTag