Hospitals and healthcare facilities face a unique set of challenges in an active shooter incident. These incidents have no patterns in victim selection or method, creating an unpredictable and quickly evolving situation that can lead to loss of life and injury. Numerous factors associated with hospital and healthcare environments complicate traditional response to active shooter incidents, including the “duty-to-care”, also known as “duty-to-act”, commitment and the varying levels of patient mobility and patient special needs.
CISA and S&T will present a new R&D funding project focused on mobile network infrastructure during an Industry Day event on May 16 in Washington, D.C.
This factsheet communicates the Department’s legal authority under the Preventing Emerging Threats Act to counter credible threats from UAS to the safety or security of a covered facility or asset, ensure legal privacy protections, and educate the public on the future of DHS CUAS policy.
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) today released the inaugural set of National Critical Functions. These are functions used or supported by government and the private sector that are of such vital importance to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
Today, Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs issued Binding Operational Directive (BOD) 19-02, Vulnerability Remediation Requirements for Internet-Accessible Systems, to enhance federal agencies’ coordinated approach to ensuring effective and timely remediation of critical and high vulnerabilities in information systems.
U.S. critical infrastructure relies on Information and Communications Technology (ICT)—defined by the National Institute of Standards and Technology as “the capture, storage, retrieval, processing, display, representation, presentation, organization, management, security, transfer, and interchange of data and information”—for daily operations and functionality. The Design, Development and Production, Distribution, Acquisition and Deployment, Maintenance, and Disposal phases of the ICT supply chain are susceptible to the malicious or inadvertent introduction of vulnerabilities such as malicious software and hardware; counterfeit components; and poor product designs, manufacturing processes, and maintenance procedures.
CISA and S&T are seeking development of new standards to improve the security and resilience of critical mobile communications networks through a new BAA Solicitation 70RSAT19RB00000001.
How to Contact and work with CISA.
An accurate accounting of time is of critical importance to nearly every modern organization. Because of its low cost and universal availability, The Global Positioning System (GPS) has become the standard time keeper for many commercial users across the globe.
CISA rapidly notifies relevant critical infrastructure stakeholders of elevated risk exposure, conducts incident management operations, provides vulnerability assessments, and directly deploys risk management information, tools, and technical services to mitigate risk, including regulatory enforcement where authorized.