You are here

Cybersecurity and Infrastructure Security Agency (CISA)

Acting Secretary Wolf Receives Updates at FEMA and CISA Before Traveling to Honduras

Acting Secretary of Homeland Security Chad F. Wolf visited the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and Federal Emergency Management Agency (FEMA) to meet with leadership to discuss current situations the agencies are monitoring. Following these discussions, Acting Secretary Wolf departed for Honduras where he is participating in bilateral meetings on regional security and migration.

DHS/CISA/PIA-034 Protected Critical Infrastructure Information Program

The Protected Critical Infrastructure Information (PCII) Program, part of the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Infrastructure Security Division (ISD), Infrastructure Assessments and Analysis (IAA) Sub-Division, facilitates the sharing of PCII between the Government and the private sector. CISA has conducted this privacy impact assessment (PIA) to analyze and evaluate the privacy impact of the PCII Program’s overall operations, including the PCII submission and validation process, and user access management. Most of this work occurs on the Protected Critical Infrastructure Information Management System (PCIIMS). PCIIMS is an Information Technology (IT) system and the means by which PCII submissions from non-federal critical infrastructure owners and operators are received and cataloged, and PCII Authorized Users are registered, trained, and managed. This system receives, provides validation processes, and securely stores critical infrastructure information (physical and cyber systems and assets) meeting the PCII program definition for validation. This PIA replaces DHS/NPPD/PIA-006 Protected Critical Infrastructure Information Management System, published July 13, 2011.

Snapshot: Top 25 Most Dangerous Software Errors

The Common Weakness Enumeration (CWE) list of the 25 most dangerous software errors is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software.

DHS/CISA/PIA-033 National Cybersecurity Protection System (NCPS)-Intrusion Detection

The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division (CSD) leads the Federal Government effort to protect and defend federal civilian Executive Branch agency networks from cyber threats. These efforts are conducted, in part, through the National Cybersecurity Protection System’s (NCPS) intrusion detection capabilities — formerly referred to as EINSTEIN 1 and EINSTEIN 2. This Privacy Impact Assessment (PIA) provides a programmatic update on the NCPS intrusion detection capabilities and provides an in-depth analysis of the collection of information related to known or suspected cyber threats that could potentially include information that could be considered personally identifiable information (PII). Due to the close operational relationship between the NCPS network flow (netflow) and intrusion detection capabilities, this PIA combines, updates, and replaces the former EINSTEIN PIA (September 2004) and EINSTEIN 2 PIA (May 2008).

Insider Threats Programs for the Critical Manufacturing Sector Implementation Guide

Developed by CISA and the Department of Defense’s Defense Counterintelligence and Security Agency, the Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide provides guidance and information for critical manufacturing organizations to establish insider threat programs. These programs serve to gather, monitor, and assess information for insider threat detection and mitigation strategies.

TIES

TIES are a series of nation-wide collaborative events designed to engage, develop and foster relationships while educating innovator communities about DHS’ vast mission, homeland security challenges, and specific component operational needs.

Pages

Subscribe to Cybersecurity and Infrastructure Security Agency (CISA)
Back to Top