Cyber

Cyber Storm VIII Fact Sheet

Cyber Storm VIII, planned for Spring 2022, will allow participants to exercise their incident response plans and identify opportunities for coordination and information sharing. Cyber Storm exercises have historically engaged more than 1,000 distributed players over the course of three days of live exercise play.

Cyber Storm VIII

Cyber Storm VIII, planned for Spring 2022, will allow participants to exercise their incident response plans and identify opportunities for coordination and information sharing. Cyber Storm exercises have historically engaged more than 1,000 distributed players over the course of three days of live exercise play.

CISA and FBI Urge Organizations to Remain Vigilant to Ransomware Threats on Holidays, Including this Labor Day

he Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a cybersecurity advisory today to highlight precautions and mitigation steps that public and private sector organizations can take to reduce their risk to ransomware and other cyber attacks, specifically leading up to holidays and weekends. This advisory is based on observations on the timing of high impact ransomware attacks that have occurred previously rather than a reaction to specific threat reporting.
Last Published Date: August 31, 2021

CISA Releases New Cyber Training Guide

The Cybersecurity and Infrastructure Security Agency (CISA) released a new downloadable Cybersecurity Workforce Training Guide today to assist future and current cybersecurity and information technology (IT) professionals chart a successful career path. This guide is a one-stop-shop for information and resources to help professionals start and/or advance their careers in cybersecurity through training.
Last Published Date: August 9, 2021

Submit Your Cyber Resume

As technology becomes increasingly more sophisticated, the demand for an experienced and qualified cyber workforce to protect our Nation’s networks and information systems has never been greater. At CISA, you will be working at the forefront of the cybersecurity challenges facing our Nation and will have access to the most cutting-edge technology.

Are you up for the challenge?  If so, submit your resume today!

Risks Telecommunications Central Offices

This infographic identifies the risks associated with physical, cyber, utilities and services, and network resilience of telecommunications central office services as well as potential mitigations to improve telecommunication resiliency. It is meant to facilitate constructive and meaningful dialogue between service providers and their customers in critical infrastructure and Federal, State, Local, Tribal, and Territorial (FSLTT) governments on how to lower the risk to their facilities from physical and cyber threats.

Software Supply Chain Attacks

The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate software supply chain risks.