You are here

Industry Cybersecurity

Vulnerability Disclosure Program Policy and Rules of Engagement

In accordance with Section 101 and Title I of the SECURE Technology Act (P.L. 115-390), this policy provides security researchers with clear guidelines for (1) conducting vulnerability and attack vector discovery activities directed at Department of Homeland Security (DHS) systems and (2) submitting those discovered vulnerabilities. This policy has been developed in consultation with the Attorney General, the Secretary of Defense, the Administrator of GSA, and non-governmental security researchers.

Technology and Innovation Exchanges: Securing Mobile Network Infrastructure

The Technology and Innovation Exchanges: Securing Mobile Network Infrastructure engagement, hosted by DHS S&T and CISA, focuses on the DHS operational mission of mobile network infrastructure, specifically protecting and securing legacy, current and 5G mobile network communications, services and equipment.

S&T is Exhibiting at RSA 2019

The Department of Homeland Security (DHS) Science and Technology Directorate’s (S&T) cybersecurity research and development (R&D) program develops innovative solutions to meet a broad array of cybersecurity challenges across the U.S. government, international partners, academia and the private sector. 

DHS Announces ICT Supply Chain Risk Management Task Force Members

The Department of Homeland Security (DHS) hosted the inaugural meeting of the nation’s first Information and Communications Technology (ICT) Supply Chain Risk Management Task Force. The task force is a public-private partnership formed to examine and develop consensus recommendations to identify and manage risk to the global ICT supply chain.

CSD-TTP-2017-October-New York-Finance-Demo

The Transition to Practice (TTP) program accelerates the path of cybersecurity technologies from the research lab to the marketplace. TTP identifies promising federally funded cybersecurity technologies and facilitates their adoption into broader use through partnerships with the private sector and commercialization.

Subscribe to Industry Cybersecurity
Back to Top