This infographic identifies the risks associated with physical, cyber, utilities and services, and network resilience of telecommunications central office services as well as potential mitigations to improve telecommunication resiliency. It is meant to facilitate constructive and meaningful dialogue between service providers and their customers in critical infrastructure and Federal, State, Local, Tribal, and Territorial (FSLTT) governments on how to lower the risk to their facilities from physical and cyber threats.
The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate software supply chain risks.
What is the future of women in cyber?
As the nation’s first cybersecurity agency, one of our top goals from the starting gate has been to increase the representation of women and men of all backgrounds throughout the CISA workforce.
CISA Issues Emergency Directive to Mitigate the Compromise of Solarwinds Orion Network Management Products
The Edge vs. Core - An Increasingly Less Pronounced Distinction in 5G Networks informs stakeholders about how edge computing increases the risks of untrusted components into 5G networks by moving core functions away from traditional network boundaries. The product is intended to provide an overview of edge computing and represents CISA’s analysis of the risks associated with installation of untrusted components into 5G infrastructures.
The Port Facility Cybersecurity Risks Infographic details how cyberattacks could impact different aspects of port operations. The risks identified in this infographic do not encompass all risks to maritime facilities and are meant to demonstrate some of the potential activities of malicious cyber actors.
Return to National Risk Management.
This role is responsible for the management and administration of processes and tolls that enable the organization to identify, document, preserve, transfer, analyze, synthesize, and access intellectual capital and information content.
Personnel performing this work role may unofficially or alternatively be called:
These are the agendas for the Cyber Threat Information Sharing Working Group