
Document 01
This testimony, delivered in 2008 at the conclusion of a security review of the Los Alamos National Laboratory, reports on the state of the laboratory's physical and cyber security, including shortcomings in the security of its unclassified computer networks.

Document 02
This document outlines South Korea's strategy for developing an effective cyber response capability. Cooperative efforts are heavily emphasized.

Document 04
This notice by the Chief of Naval Operations reorganizes commands between Fleet Cyber Command and the Navy Information Dominance Force.

Document 05
This document outlines challenges to law enforcement that arise from rapidly evolving encryption techniques and risk outpacing the law enforcement community's decryption capabilities.

Document 06
This presentation outlines an adaptable framework for cybersecurity that can be tailored to specific critical infrastructure 'profiles'.

Document 07
This document observes that security is being outpaced by innovation related to the Internet of Things and establishes a framework of developing the relevant security within the developer, manufacturer, service provider, and consumer communities.

Document 08
This report examines secure efforts in federally-administered critical infrastructure and recommends that DHS make efforts to coordinate access control between different sectors.

Document 09
This document explains the FISA Amendments Act from the perspective of the US Intelligence Community.

Document 10
This document reveals that first responder professional networks and personal information have been increasingly targeted in cyber attacks.

Document 11
This document explains the function of the Justice Department, specifically the FBI, in federal response to cyber incidents.

Document 12
This notice warns of vulnerabilities in several models of pacemakers using RF communications.