Managing a Cyber Attack on Critical Infrastructure: Challenges of Federal, State, Local, and Private Sector Collaboration

Managing a Cyber Attack on Critical Infrastructure: Challenges of Federal, State, Local, and Private Sector Collaboration

This after-action report from an INSA tabletop exercise examines the effectiveness of mechanisms to respond to and recover from a cyber attack on multiple critical infrastructure sectors. Discover the report's findings and recommendations by clicking the button below. ...

An Assessment of Data Analytics Techniques for Insider Threat Programs

An Assessment of Data Analytics Techniques for Insider Threat Programs

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats – trusted employees who seek to steal an organization’s data or intellectual property or to harm an organization or its staff. Determining which data analytics methods and software tools are best for an organization, however, depends on the quality and comprehensiveness of data, the clarity of rules, the organization’s risk tolerance, and other factors. This paper prese ...

Civilian Careers in U.S. Intelligence and National Security

Civilian Careers in U.S. Intelligence and National Security

THE U.S. INTELLIGENCE COMMUNITY (IC) offers a wide range of interesting, engaging, and exciting career paths. Whether you choose to work at an intelligence agency as a career civilian or to support the Community through work at a private sector contractor, you will have the chance to serve your country by contributing to U.S. national security. This paper provides some information on the types of intelligence-related opportunities and career paths one can pursue as a civilian in government and ...

FINnet: Classified Information Sharing for the Financial Sector

FINnet: Classified Information Sharing for the Financial Sector

INSA encourages the US Government to partner with financial institutions to establish a unique, public-private CS/IA program. Such a program should include a portal modeled on DIBnet to enable the real-time, secure flow of classified and unclassified cyber threat data between federal and non-federal entities. ...

Close
Close

Please enter your username or email address. You will receive a link to create a new password via email.

Close

Close