You are here

Cybersecurity and Infrastructure Security Agency (CISA)

DHS/CISA/PIA-033 National Cybersecurity Protection System (NCPS)-Intrusion Detection

The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division (CSD) leads the Federal Government effort to protect and defend federal civilian Executive Branch agency networks from cyber threats. These efforts are conducted, in part, through the National Cybersecurity Protection System’s (NCPS) intrusion detection capabilities — formerly referred to as EINSTEIN 1 and EINSTEIN 2. This Privacy Impact Assessment (PIA) provides a programmatic update on the NCPS intrusion detection capabilities and provides an in-depth analysis of the collection of information related to known or suspected cyber threats that could potentially include information that could be considered personally identifiable information (PII). Due to the close operational relationship between the NCPS network flow (netflow) and intrusion detection capabilities, this PIA combines, updates, and replaces the former EINSTEIN PIA (September 2004) and EINSTEIN 2 PIA (May 2008).

Insider Threats Programs for the Critical Manufacturing Sector Implementation Guide

Developed by CISA and the Department of Defense’s Defense Counterintelligence and Security Agency, the Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide provides guidance and information for critical manufacturing organizations to establish insider threat programs. These programs serve to gather, monitor, and assess information for insider threat detection and mitigation strategies.

CISA Strategic Intent

This document lays out the strategic vision and operational priorities of the CISA Director. It provides a general approach for how we execute our responsibilities and serves as a reference point for our employees and partners to guide our work and create unity of effort. It aims to position us to successfully meet our mission in the coming years and decades. It serves as the interim strategy as we develop a longer-term strategic plan.


Under CFATS, Tier 3 or 4 facilities may receive expedited approval of their Site Security Plan and enter directly into a regular cycle of compliance inspections.

RBPS 1-7 Detection Delay

Detecting and delaying an intrusion or attack on a high-risk chemical facility is a critical component of a facility’s security.


The Fifth Generation of wireless technology, or 5G, will enable new innovation, new markets, and economic growth around the world. Tens of billions of new devices will be connected to the Internet through 5G technology. These connections will empower a vast array of new and enhanced critical services, from autonomous vehicles and telemedicine, to automated manufacturing and advances to traditional critical infrastructure, such as smart grid electricity distribution. Given 5G’s scope, the stakes for safeguarding these vital networks could not be higher. CISA is leading risk mitigation efforts across the federal government and is committed to working with government and industry partners to ensure the security and integrity of 5G technology in our nation.


TIES are a series of nation-wide collaborative events designed to engage, develop and foster relationships while educating innovator communities about DHS’ vast mission, homeland security challenges, and specific component operational needs.


Subscribe to Cybersecurity and Infrastructure Security Agency (CISA)
Back to Top