11![Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure](https://www.pdfsearch.io/img/bf39781372c9e5e76c7ec09d080ae66d.jpg) | Add to Reading ListSource URL: fas.orgLanguage: English - Date: 2014-05-06 20:16:48
|
---|
12![Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference](https://www.pdfsearch.io/img/9a4f49b4847923407ddf617653cda320.jpg) | Add to Reading ListSource URL: aspi.org.auLanguage: English - Date: 2014-02-13 22:52:14
|
---|
13![The Protecting Cyber Networks Act Undermines Privacy, Enables CyberSurveillance, and Threatens Internet Security By Robyn Greene, Policy Counsel This month, the House of Representative The Protecting Cyber Networks Act Undermines Privacy, Enables CyberSurveillance, and Threatens Internet Security By Robyn Greene, Policy Counsel This month, the House of Representative](https://www.pdfsearch.io/img/08ee83ac5ab97f8827ebf172bcb4e760.jpg) | Add to Reading ListSource URL: static.newamerica.orgLanguage: English - Date: 2015-04-20 18:04:23
|
---|
14![Cybersecurity Information Sharing Act of 2015 Is CyberSurveillance, Not Cybersecurity By Robyn Greene, Policy Counsel This month, Congress is expected begin consideration of the Cybersec Cybersecurity Information Sharing Act of 2015 Is CyberSurveillance, Not Cybersecurity By Robyn Greene, Policy Counsel This month, Congress is expected begin consideration of the Cybersec](https://www.pdfsearch.io/img/7eb1aeccfe1f77966d614fdd361b40f2.jpg) | Add to Reading ListSource URL: static.newamerica.orgLanguage: English - Date: 2015-04-09 17:37:57
|
---|
15![Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011 Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011](https://www.pdfsearch.io/img/2950889a9055a99887a98fc2db5894c4.jpg) | Add to Reading ListSource URL: fas.orgLanguage: English - Date: 2014-05-06 20:17:00
|
---|
16![Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com](https://www.pdfsearch.io/img/1437eaeecb30bbba78954b21557b8ca9.jpg) | Add to Reading ListSource URL: www.raytheoncyber.comLanguage: English - Date: 2015-04-19 23:42:34
|
---|
17![Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES](https://www.pdfsearch.io/img/1800fdda4df83e1831a066c7e52580c2.jpg) | Add to Reading ListSource URL: belfercenter.ksg.harvard.eduLanguage: English - Date: 2015-05-05 15:45:46
|
---|
18![Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com](https://www.pdfsearch.io/img/b6a95f8b4ca5eba4b98c17f103f97d48.jpg) | Add to Reading ListSource URL: www.raytheoncyber.comLanguage: English - Date: 2015-04-19 07:38:51
|
---|
19![Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council](https://www.pdfsearch.io/img/cbcea5ed23d85b4cb0df48363ec2cc4c.jpg) | Add to Reading ListSource URL: sites.nationalacademies.orgLanguage: English - Date: 2014-10-25 10:17:11
|
---|
20![Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute](https://www.pdfsearch.io/img/f61843bada51e1c5d7fdfb9450b2294a.jpg) | Add to Reading ListSource URL: www.cs.ox.ac.ukLanguage: English - Date: 2015-03-18 10:54:09
|
---|