What people are saying - Write a review
We haven't found any reviews in the usual places.
According actions activities addition Agriculture American analysis appropriate assets associations attacks Banking calls Center challenges Chemical communications conference considered continue critical infrastructure Critical Infrastructure Protection critical infrastructure sectors cyber Department Department of Homeland designated developing Directorate discuss disseminating Division e-mail effective efforts Electricity Emergency encourage Energy enhance ensure entities established example exercises federal agencies federal government federal policy Financial Services ISAC Food functions funding Further GAO's April 21 grant healthcare Homeland Security IAIP identified importance improve incidents increase industry information sharing information-sharing initiatives ISAC Council issues mechanisms membership officials operations organizations participation partnership physical private sector procedures processes received recommendations relationships Represents requirements respective responsibilities roles sector coordinators sector-specific agencies specific Technology Telecommunications Testimony threats Transit Transportation trusted United vulnerabilities warnings Water
Page 23 - We also reviewed and analyzed the National Strategy for Homeland Security, the National Strategy to Secure Cyberspace, the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, the National Strategy for Combating Terrorism, l the Homeland Security Act of 2002/and other relevant federal policies.
Page 22 - States; (2) recommending measures to protect the key resources and critical infrastructure of the United States in coordination with other federal agencies and in cooperation with state and local government agencies and authorities, the private sector, and other entities...
Page 23 - These prior reports and testimonies included our review and analysis of the National Strategy for Homeland Security, the National Strategy to Secure Cyberspace, the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, the National Strategy for Combating Terrorism, l the Homeland Security Act of 2002,2 and other relevant federal policies.
Page 14 - We will also make copies available to others upon request. In addition, the report will be available at no charge on GAO's Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or firstname.lastname@example.org.
Page 8 - ... analysis mechanisms. Additionally, the Department and SectorSpecific Agencies shall collaborate with the private sector and continue to support sectorcoordinating mechanisms: (a) to identify, prioritize, and coordinate the protection of critical infrastructure and key resources; and (b) to facilitate sharing of information about physical and cyber threats, vulnerabilities, incidents, potential protective measures, and best practices. National Special Security Events...
Page 57 - GAO's Web site (www.gao.gov) contains abstracts and fulltext files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this hat, known as "Today's Reports,
Page 5 - Banking and finance Provides the financial infrastructure of the nation. This sector consists of commercial banks, insurance companies, mutual funds, government-sponsored enterprises, pension funds, and other financial institutions that carry out transactions including clearing and settlement.
Page 4 - Security critical infrastructure protection responsibilities in (1) developing a comprehensive national plan for securing the key resources and critical infrastructure of the United States...
Page 22 - ... enforcement information, intelligence information, and other threat and incident information from respective agencies of federal, state, and local governments and the private sector, and for combining and analyzing such information to identify and assess the nature and scope of terrorist threats.