DHS S&T awarded a $704,000 research-and-development (R&D) contract to Atlanta-based Georgia Tech Applied Research Center (GTARC) to address a crucial gap in the trustmark framework for the public safety community’s information sharing and safeguarding (IS&S) capabilities.
Cybersecurity and Infrastructure Security Agency (CISA)
Acting Secretary of Homeland Security Chad F. Wolf visited the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and Federal Emergency Management Agency (FEMA) to meet with leadership to discuss current situations the agencies are monitoring. Following these discussions, Acting Secretary Wolf departed for Honduras where he is participating in bilateral meetings on regional security and migration.
The Protected Critical Infrastructure Information (PCII) Program, part of the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Infrastructure Security Division (ISD), Infrastructure Assessments and Analysis (IAA) Sub-Division, facilitates the sharing of PCII between the Government and the private sector. CISA has conducted this privacy impact assessment (PIA) to analyze and evaluate the privacy impact of the PCII Program’s overall operations, including the PCII submission and validation process, and user access management. Most of this work occurs on the Protected Critical Infrastructure Information Management System (PCIIMS). PCIIMS is an Information Technology (IT) system and the means by which PCII submissions from non-federal critical infrastructure owners and operators are received and cataloged, and PCII Authorized Users are registered, trained, and managed. This system receives, provides validation processes, and securely stores critical infrastructure information (physical and cyber systems and assets) meeting the PCII program definition for validation. This PIA replaces DHS/NPPD/PIA-006 Protected Critical Infrastructure Information Management System, published July 13, 2011.
The Common Weakness Enumeration (CWE) list of the 25 most dangerous software errors is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software.
Attorney General William Barr, Secretary of Defense Mark Esper, Acting Secretary of Homeland Security Kevin McAleenan, Acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, U.S. Cyber Command Commander and NSA Director Gen. Paul Nakasone, and CISA Director Christopher Krebs today released the following joint statement:
DHS CISA and S&T will jointly showcase their cybersecurity capabilities and technology solutions at Mobile World Congress Los Angeles 2019 next week.
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division (CSD) leads the Federal Government effort to protect and defend federal civilian Executive Branch agency networks from cyber threats. These efforts are conducted, in part, through the National Cybersecurity Protection System’s (NCPS) intrusion detection capabilities — formerly referred to as EINSTEIN 1 and EINSTEIN 2. This Privacy Impact Assessment (PIA) provides a programmatic update on the NCPS intrusion detection capabilities and provides an in-depth analysis of the collection of information related to known or suspected cyber threats that could potentially include information that could be considered personally identifiable information (PII). Due to the close operational relationship between the NCPS network flow (netflow) and intrusion detection capabilities, this PIA combines, updates, and replaces the former EINSTEIN PIA (September 2004) and EINSTEIN 2 PIA (May 2008).
The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) held its second annual National Cybersecurity Summit September 18-20, for cybersecurity leaders and experts from government, industry and academia to discuss ways to collectively defend against the threats of today and secure against the risks of tomorrow.
Developed by CISA and the Department of Defense’s Defense Counterintelligence and Security Agency, the Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide provides guidance and information for critical manufacturing organizations to establish insider threat programs. These programs serve to gather, monitor, and assess information for insider threat detection and mitigation strategies.
TIES are a series of nation-wide collaborative events designed to engage, develop and foster relationships while educating innovator communities about DHS’ vast mission, homeland security challenges, and specific component operational needs.