Back to Results
First PageMeta Content
Hacking / United States Department of Homeland Security / Military / Net-centric / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Department of Defense Cyber Crime Center / Cyberwarfare / Computer crimes / Military science


August[removed]Defense Horizons National Defense University David J. Kay is a Research Analyst
Add to Reading List

Document Date: 2014-03-06 11:49:14


Open Document

File Size: 438,38 KB

Share Result on Facebook

City

San Antonio / Palo Alto / /

Company

Lockheed Martin / Sony / Google / Facebook / Royal Bank of Scot / Defense Information Systems Agency / Boeing / /

Country

Puerto Rico / United States / /

Currency

USD / /

Facility

National Defense University / University System / Kelly Air Force Base / National Institute of Risk Management Process / University of California at Los Angeles / Cornell University / University of Texas / Massachusetts Institute of Technology / California Institute of Technology / University of Wisconsin / /

IndustryTerm

high-tech workforce / e-governance / online quiz college students / government networks / aerial systems / tion technology / public school systems / computer technology / finance / in-house networks / Web Links Cyber Security Treasure Hunt Like / social media / electricity / state education systems / surplus equipment / online operations / networked intelligence systems / versatile device / database developer / online presence / /

MusicGroup

OPM / /

OperatingSystem

Microsoft Vista / /

Organization

Institute for Standards and Technology / High school / California Institute of Technology / Defense Advanced Research Projects Agency / University of Texas at Austin / National Security Agency / IA / Atlantic Council of the United States / U.S. Government / Center for Technology and National Security Policy / National Institute of Risk Management Process / Government Accountability Office / Center for Technology and National Security Policy About / Department of Veterans Affairs / Massachusetts Institute of Technology / office of Management and Budget / office of Personnel Manage / Colorado’s office of Cyber-Security / Commission on Cybersecurity / office of the State / Federal Bureau of Investigation / FISMA / Cornell University / Congress / White House / Federal Government / National Security Policy / National Defense University / U.S. Cyber Command / Aerospace Academy / US Federal Reserve / Pipelines Within government / Center for Strategic and International Studies / Department of Homeland Security / Department of Defense / Cyber Security Task Force / Institute for National Strategic Studies / University of California at Los Angeles / U.S. Strategic Command / University of Wisconsin / Center for Technology / National Association of State Chief Information Security / /

Person

Terry J. Pudas / Operate / Investigate / Robert Gates / David J. Kay / Brett Young / Jim Langevin / William Kirwin / /

Position

intelligence usefulness Cyber threat analyst / Secretary of Defense / Inspector / Research Analyst / paralegal / security officer / Chancellor / technical support specialist / database developer / maintenance LAN administrator / technical support specialist / manager lists / Inspector General / security analyst / network technician / reverse engineer / Research Assistant / Governor / Comptroller / mitigating threats Blue Team technician / security analyst / network technician / cyber Legal advisor / information security trainer / education chief / systems Software engineer / risk/vulnerability analyst / Computer network defense forensic analyst / computer crime investigator / /

ProvinceOrState

Texas / Vermont / Wisconsin / Bexar County / Maryland / California / Iowa / Massachusetts / Colorado / /

Technology

operating systems / computer technology / tion technology / /

URL

www.nbise / www.uscyberpatriot / http /

SocialTag