Science and Technology Cybersecurity Resources

Cybersecurity Resources

DHS Science and Technology Directorate Cyber Security Division published documents and other cyber security references and links can be found on this page. Visit the cybersecurity projects, news and resources pages for cyber specific articles and other written products or connect with us at the next S&T cybersecurity event.  

Cybersecurity Videos

2017 R&D Showcase and Technical workshop

2017 Cyber Security R&D Showcase and Technical Workshop // Promo Video

2017 R&D Showcase: S&T Cyber Security Division Strategic Vision

2017 R&D Showcase: Cyber Security Division R&D Performer Awards and Conference Recap

2017 R&D Showcase: Keynote Speaker and White House Cybersecurity Coordinator Rob Joyce

2017 R&D Showcase: Keynote Speaker and Representative of Rhode Island Jim Langevin

2017 R&D Showcase: Keynote Edward Amoroso Provides A Random Walk Through Cyber Security

2017 R&D Showcase: CxO Fireside Chat - Threats, Challenges and Insights

2017 R&D Showcase: Innovations in Cyber Security Education Panel

2017 R&D Showcase: Comic-Based Education and Evaluation (Comic-BEE)

2017 R&D Showcase: General Analysis Toolkit Using Record and Reply

2017 R&D Showcase: GovReady Compliance Apps

2017 R&D Showcase: Internet Atlas

2017 R&D Showcase: Linking the Oil and Gas Industry to Improve Cybersecuirty (LOGIIC)

2017 R&D Showcase: Mapping Our Way to a More Secure Internet

2017 R&D Showcase: Mobile App Vetting

2017 R&D Showcase: Securely Updating Automobiles

2017 R&D Showcase: Self-Shielding Dynamic Network Architecture

2017 R&D Showcase: Transition to Practice's ZeroPoint

National Cyber Security Awareness

October is National Cyber Security Awareness Month

Become Cyber Savvy... Quick Tips for Mobile

Become Cyber Savvy...Protect Against Phishing Attacks

Become Cyber Savvy...Smart Tips in an IoT World

Become Cyber Savvy... Security Tips for Software Developers

Become Cyber Savvy... Security Tips for Banking Safety Online

Cybersecurity Project Videos

Cyber Security Competitions

Cyber Security Division Overview

Cyber Security Division Transition to Practice Program

Identity Management

International Partnerships

Linking Oil and Gas Industry to Improve Cybersecurity (LOGIIC)

Software Assurance Marketplace (SWAMP)

Trustworthy Cyber Infrastructure for the Power Grid (TCIP-G)

Transition to Practice Videos

2017 Cyber Security Division Transition to Practice Cohort Technology Videos

Cyber Security Division Transition to Practice Spotlight

Cybersecurity Fact Sheets

S&T's Cyber Security Division: Securing Your Cyber Future

Anonymous Networks and Currencies

Cybersecurity Forensics Support for Law Enforcement

Cyber Physical Systems Security

Defense Experimental Research Testbed

Distributed Denial of Service Defense (DDoSD)

DDoSD Telephony Denial of Service (TDoS)

Distributed Environment for Critical Infrastructure Decision-Making Exercises (DECIDE)

Homeland Open Source Technology

Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT)

Insider Threat

Mobile Device Security

National Critical Infrastructure Security and Resilience R&D Plan

Next Generation Cyber Infrastructure Apex

Project iVe Vehicle Navigation Infotainment System Forensics for Law Enforcement

Software Quality Assurance

Transition to Practice

DHS S&T Cybersecurity Blogs

Cyber Security R&D Program a Launching Pad for New Solutions, February 26, 2018

DHS S&T Cybersecurity Documents

2018 Cybersecurity Portfolio Guide

2018 Cybersecurity Technology Guide

2017 Cyber Security R&D Showcase and Technical Workshop Program Guide

2017 Cyber Security Division Transition to Practice Technology Guide

2016 Cyber Security R&D Showcase and Technical Workshop Program Guide

Cyber Security Division FY 2013 Annual Report

CSD Moving Towards Interoperability

CSD Transition to Practice Infographic

DHS Study on Mobile Device Security

The Menlo Report

The Menlo Companion Report

Mobile App Security Study: Securing Mobile Applications for First Responders

Mobile Security R&D Program Guide, Volume 2

National Institute of Standards and Technology (NIST) Computer Forensic Tool Testing (CFTT) Reports - DHS S&T partners with the National Institute of Standards and Technology (NIST) Computer Forensic Tool Testing (CFTT) project to provide forensic tool testing reports to the public. The CFTT project has established a methodology for testing computer forensic software tools utilizing tool specifications, test procedures, test criteria, test sets, and test hardware.

Open Source Software in Government: Challenges and Opportunities

Software Assurance Marketplace (SWAMP) Vision Document

A Roadmap for Cybersecurity Research

Other Cybersecurity Documents

As a service to the community, we present this collection of public documents that are highly relevant to planning of cybersecurity research and development.

2014 Quadrennial Homeland Security Review

2015 NITRD Cyber Physical Systems Vision Statement (PDF, 08 Pages, 355.76 KB)

Cybersecurity National Action Plan

Cyberspace Policy Review (PDF, 76 Pages, 710.50 KB)

DHS Fact Sheet: Blueprint for a Secure Cyber Future 2011

Executive Order 13636: Improving Critical Infrastructure Cybersecurity and Presidential Policy Directive-21: Critical Infrastructure Security and Resilience

Federal Cybersecurity Research and Development Strategic Plan, February 2016 (PDF, 52 pages, 950.39 KB)

National Critical Infrastructure Security and Resilience (CISR) Research and Development (R&D) Plan

National CISR R&D Implementation Roadmap (PDF, 43 pages, 915.53 KB)

National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience

National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (PDF, 41 Pages, 930 KB)

NIST Special Publication 800-183: Network of ‘Things’ (PDF, 30 Pages, 2.73 MB)

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program (PDF, 36 Pages, 794.66 KB)

Cybersecurity Links

Collegiate Cyber Defense Challenge (CCDC)

The Collegiate Cyber Defense Challenge (CCDC) is a capture the flag-style tournament. The nation is divided into nine regions with an additional at-large region, where teams of eight students compete against each other to defend their networks and associated services and the winners of each region advance to the National CCDC.

Computing Research Association

The Computing Research Association (CRA) is an association of more than 200 North American academic departments of computer science, computer engineering, and related fields; laboratories and centers in industry, government, and academia engaging in basic computing research; and affiliated professional societies.

DETER Project

The goal of the Defense Technology Experimental Research (DETER) laboratory effort is to create, maintain, and support a collaborative and vendor-neutral experimental environment for cybersecurity research. It is intended to provide a center for interchange and collaboration among security researchers and testbed builders.

DNSSEC Deployment Initiative

The DNS Security Extensions (DNSSEC) Deployment Coordination Initiative is part of a global effort to deploy new security measures that will help the DNS perform as people expect it to – in a trustworthy manner.

Federal Cybersecurity Game-change R&D

This website is devoted to promoting information exchange for advancing the U.S. Federal cybersecurity game-change research agenda.

IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk & Trust

The Information Marketplace for Policy and Analysis of Cyber-risk & Trust project supports global cyber risk research & development by coordinating, enhancing and developing real world data, analytics and information sharing capabilities, tools, models, and methodologies. In order to accelerate solutions around cyber risk issues and infrastructure security, IMPACT makes these data sharing components broadly available as national and international resources to support the three-way partnership among cyber security researchers, technology developers and policymakers in academia, industry and the government.

Institute for Information Infrastructure Protection

The Institute for Information Infrastructure Protection (I3P) is a Consortium that includes academic institutions, federally-funded labs and non-profit organizations.

Institute for Security Technology Studies

The Institute for Security Technology Studies (ISTS) at Dartmouth College is dedicated to pursuing research and education for cybersecurity and trust.

Software Assurance Market Place (SWAMP)

Software is a crucial component of daily living, affecting our privacy, worldwide economic structures, and the services we depend on every day. With the increasing rate of security breaches, today’s applications need to be built more securely at the code level, and that code needs to be tested regularly. The Software Assurance Marketplace was developed to make it easier to consistently test the quality and security of these applications and bring a transformative change to the software assurance landscape by reducing the number of weaknesses deployed in software.

U.S. Cyber Challenge (USCC)

The U.S. Cyber Challenge (USCC) seeks to create a pipeline through which talented youth will be discovered, guided and enabled to progress towards careers as technical cybersecurity experts. The goal is to deploy and test multiple talent competitions and talent development initiatives to enable high school and college students to develop and demonstrate their cyber skills. USCC organizes multiple events for high school students throughout the year including Cyber Foundations workshops as well as summer camps.

Was this page helpful?

This page was not helpful because the content:
Back to Top