Found 13 datasets matching filters.
-
- Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the...
Search relevance: 1.00 | Views last month: 56 | Catalog Last Checked: May 04, 2026 at 02:19 PM -
Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the...
Search relevance: 1.00 | Views last month: 22 | Catalog Last Checked: May 04, 2026 at 02:20 PM -
The HireVue platform provides a virtual capability component to support face-to face interviews, online messaging capabilities, video chat recording, virtual informational booth areas for...
Search relevance: 1.00 | Views last month: 10 | Catalog Last Checked: May 06, 2026 at 11:12 AM -
High-level summary of all Services in the Catalog, filterable and searchable by parameterization. May be viewed in Tiles/Cards format or in List format. Catalog includes detailed information about...
Search relevance: 1.00 | Views last month: 8 | Catalog Last Checked: May 06, 2026 at 11:13 AM -
To implement the Secretary's authority in 6 U.S.C. 658 which allows for the Cybersecurity Talent Management Systems (CTMS), the Department of Homeland Security (DHS) must build and maintain a team...
Search relevance: 1.00 | Views last month: 5 | Catalog Last Checked: May 06, 2026 at 11:12 AM -
This document provides FY2019 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 3 | Catalog Last Checked: August 02, 2025 at 07:00 AM -
This document provides FY2020 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 07:01 AM -
... The Director of the Office of Science and Technology Policy then provided a formal charge, asking PITAC members to concentrate their efforts on the focus, balance, and affectiveness of...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:56 AM -
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program defines a set of interrelated priorities for the agencies of the U.S. government that conduct...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:56 AM -
The President`s Cyberspace Policy Review challenges the Federal community to develop a framework for research and development strategies that focus on game-changing technologies that can...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:53 AM -
This document provides FY2021 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 07:03 AM -
The NITRD workshop on Tailored Trustworthy Spaces: Solutions for the Smart Grid was conceived by the Federal government to probe deeper into how Tailored Trustworthy Spaces, a strategic Federal...
Search relevance: 1.00 | Views last month: 0 | Catalog Last Checked: August 02, 2025 at 06:54 AM -
Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing systems and predominantly closed...
Search relevance: 1.00 | Views last month: 0 | Catalog Last Checked: August 02, 2025 at 06:54 AM