Cybersecurity
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
-
Comparative Assessment of the DHS Harmonization of Cyber Incident Reporting to the Federal Government Report and the Rules on Incident Reporting in the EU Directive on Measures for a High Common Level of Cybersecurity Across the Union (NIS 2 Directive)
To inform the ongoing implementation of CIRCIA and the NIS 2 Directive by the respective authorities and to support entities active in multiple jurisdictions in their efforts to respond to cyber incidents, DHS and DG CONNECT are publishing the present joint report that identifies the main similarities and divergences in the DHS Report’s recommendations and the NIS 2 Directive.
-
Zero Trust Implementation Strategy
DHS has been implementing zero trust mandates for years. This strategy establishes a shared vision that better protects resources, stabilizes cybersecurity budgets, and accelerates mission outcomes.
-
Law Enforcement Resources
This Law Enforcement Resource Guide highlights many of the Department’s threat resilience resources available to you, including training and grant opportunities.
-
Resources for Individuals on the Threat of Doxing
This infographic defines what doxing is and outlines proactive steps individuals can take to prevent themselves from doxing.
-
How to Write a Connected Community Strategy
This foundational guide is the first in a series of guides that DHS hopes will help communities achieve their connected community goals.
-
Harmonization of Cyber Incident Reporting to the Federal Government
This report outlines a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nation’s critical infrastructure.
-
Vulnerability Disclosure Program Policy and Rules of Engagement
In accordance with Section 101 and Title I of the SECURE Technology Act (P.L. 115-390), this policy provides security researchers with clear guidelines for (1) conducting vulnerability and attack vector discovery activities directed at Department of Homeland Security (DHS) systems and (2) submitting those discovered vulnerabilities. This policy has been developed in consultation with the Attorney General, the Secretary of Defense, the Administrator of GSA, and non-governmental security researchers.
-
Under Secretary Silvers Delivers Remarks at the Munich Cyber Security Conference
Under Secretary for Strategy, Policy, and Plans Robert Silvers delivered remarks at the 2023 Munich Cyber Security Conference.
-
Cyber Mission Overview
Overview of the Cyber Mission of the Department of Homeland Security, a top priority of the Biden-Harris Administration.
-
Cryptographic Agility Infographic
The Cryptographic Agility Infographic illustrates a design feature that enables updates to future cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure.