A summary of the ECPA, which protects the privacy of communications.
Read moreEmail Monitoring Rules
A list of laws governing how and when employers can monitor their employees’ electronic communication.
Read moreFBI Domestic Security Alliance Council (DSAC)
Modeled on the U.S. Department of State’s Overseas Security Advisory Council, the Domestic Security Alliance Council (DSAC) was created in October 2005 to strengthen information sharing with the private sector to help prevent, detect, and...
Read moreFBI Fusion Centers
Fusion centers are usually set up by states or major urban areas and run by state or local authorities, often with the support of the FBI. They “fuse” intelligence from participating agencies to create a more comprehensive threat picture, locally...
Read moreInfraGard
InfraGard is a partnership between the FBI and the private sector. It is an association of people who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information...
Read moreMulti-State Information Sharing and Analysis Center (MS-ISAC)
Grant-funded by DHS, the Multi-State Information Sharing and Analysis Center (MS-ISAC) exists to improve the overall cybersecurity posture of state, local, tribal, and territorial governments and is designated as the key resource for cyber threat...
Read moreNational Infrastructure Protection Plan
The National Infrastructure Protection Plan (NIPP) provides a framework for collaboration between DHS and the private sector and implements Federal Government policy for improving the Nation’s resilience. It lays out the structural model through...
Read moreBusiness Laws from the US Small Business Administration
A summary of laws and regulations relevant to small businesses provided by the US Small Business Administration.
Read moreNational Cybersecurity Assessment and Technical Services
The NCCIC’s National Cybersecurity Assessment and Technical Services (NCATS) offers cybersecurity scanning and testing services that identify vulnerabilities within stakeholder networks and provide risk analysis reports with actionable...
Read moreICS-CERT Cyber Incident Response and Analysis
The NCCIC Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) offers incident response services to owners of critical infrastructure assets that are experiencing impacts from cyber-attacks. Services include digital media and...
Read moreDHS Protective Security Advisors (PSAs)
Protective Security Advisors (PSAs) are security subject matter experts who engage with SLTT government mission partners and members of the private-sector stakeholder community to protect the Nation’s critical infrastructure. Regional directors...
Read moreISACA
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and...
Read more