You are here

Information Technology (IT)

Data Governance Council

The Data Governance Council is a senior-leadership governance body that will mature Enterprise Data Management across the Department.

DHS Information Technology Strategic Plan 2019-2023

The DHS Information Technology Strategic Plan 2019-2023 sets the Information Technology (IT) goals and strategies for fulfilling the mission of DHS.  It focuses on rebuilding foundations and driving innovation. With a mind to the future, it has been developed to address both the current state and our technological ambitions.

OCIO

The Office of the Chief Information Officer (OCIO) is responsible for implementing the programs necessary to align DHS’s Information Technology (IT) personnel, resources, and assets.

TSA Information Assurance Handbook

This handbook implements the policies and requirements of the Transportation Security Administration (TSA) Management Directive (MD) 1400.3, Information Technology Security by establishing guidance applicable to the use, development, and maintenance of TSA Information Technology (IT) assets, networks, and systems.

ISAT

ISAT is an easy-to-use tool for public safety officials and first responders from across the nation to identify their own information sharing capabilities and gaps.

S&T FRG ICAM Acquisition Guidance

The Public Safety Communications (PSC) Identity, Credential, and Access Management (ICAM) Working Group (WG) performed an assessment of available policy, procurement, grant, and other solicitation sources for ICAM procurement language across the Federal and State marketplace. This document provides guidance to the Public Safety Community (Community) to enhance existing infrastructure to include ICAM principles.

Update Your System Now to Protect Yourself Against Known Cyber Vulnerabilities

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of a set of security vulnerabilities—known as Meltdown and Spectre—that affect modern computer processors. While we are not aware of any active exploitation at this time, these vulnerabilities could allow an attacker to obtain access to sensitive information.  Patching your operating system is the best way to protect yourself form these vulnerabilities.

Pages

Subscribe to Information Technology (IT)
Back to Top