U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. Publications Library
  3. Meetings Collection

Meetings Collection

Meeting agendas, minutes and summaries from DHS working groups, task forces, and advisory councils.

  • The CIS Ombudsman's Webinar Series: USCIS' Backlog Reduction Efforts

    This page is for information on the USCIS backlog reduction webinar.

  • The CIS Ombudsman's Listening Session: USCIS Application Program Interface

    Publication page for readout for listening session on developing a USCIS API.

  • Follow Up Questions and Answers from the CIS Ombudsman's Webinar Series: Services for Noncitizen Veterans

    This site contains the presentation and follow up questions and answers from the CIS Ombudsman's Webinar Series: Services for Noncitizen Veterans.

  • P25 CAP April 15,2021, Meeting Agenda

    P25 CAP April 15, 2021, Meeting Agenda

  • Prevention of Targeted Violence Against Faith-Based Communities Subcommittee Membership List

    In light of recent attacks against synagogues, churches, temples and mosques, the Secretary of Homeland Security has tasked the Homeland Security Advisory Council (HSAC) stand up a subcommittee that is focused on the security of faith-based organizations across the country.

  • P25 CAP AP Aug. 8, 2018, Meeting Agenda and Summary

    The agenda and summary of the DHS Science and Technology Directorate's Project 25 Compliance Assessment Program Advisory Panel meeting for Aug. 8, 2018.

  • Countering Foreign Influence Subcommittee Membership List

    The Countering Foreign Influence (CFI) Subcommittee will explore the evolving range of foreign influence threats against the United States and identify additional opportunities to counter them within DHS resources and authorities. They will do so through: identifying DHS entities at Headquarters and Component levels that possess the ability to counter these threats; providing recommendations to DHS on how to handle these situations, as well as how we could enhance preparedness within the nation for possible attacks; lastly, providing recommendations on how DHS should prepare itself to respond to future attacks, how DHS should engage with governmental and non-governmental stakeholders, and how to ensure DHS activities fit in with the wider scale of government architecture relating to countering foreign influence.

  • Emerging Technologies Subcommittee Membership List

    DHS and its partners have a responsibility to look to the future in order to foresee technological advancements that might result in new threats and vulnerabilities. The Department must also put in place the right programs, policies, and procedures to mitigate potential dangers. This subcommittee will do so by: providing an assessment of current state and perceived future advancements in emerging technologies that could pose a threat to the homeland security of the U.S.; analyzing and providing insight into the way such technologies could endanger the homeland, with a focus on those that have the highest likelihood of becoming a threat; lastly, they will provide recommendations that will best mitigate perceived impacts of a threat, and provide an assessment on the opportunities for DHS components to maximize the use of new technological advancements to defend against emerging threats.

  • SLTT Cybersecurity Subcommittee Membership List

    As cyber and physical systems become more interconnected, the digital attack surface is extending further into our daily lives, with the potential for malicious cyber actors to create dangerous, real-world effects. Federal, State, Local, Tribal, and Territorial (SLTT) entities must collaborate and coordinate extensively with critical infrastructure private sector owners, operators, and stakeholders to identify and address these cybersecurity challenges. This will include: figuring out how DHS can most effectively and efficiently support SLTT agencies and partners in pursuing cybersecurity and the resilience of their IT infrastructure, including response and recovery; finding programs, services, and outreach that would provide the greatest benefit to SLTT stakeholders in reducing IT risks; lastly, measuring how effective the Homeland Security Grant Program has been in addressing risks at SLTT levels, and how the Grant Program could best be structured to address cybersecurity risks.