Statements (79)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:emergency_services
|
gptkbp:advises |
cybersecurity policies
|
gptkbp:advocates_for |
cybersecurity best practices
|
gptkbp:analyzes |
cyber threat intelligence
|
gptkbp:assets |
cybersecurity frameworks
|
gptkbp:can_conduct |
security audits
penetration testing threat assessments cybersecurity drills |
gptkbp:collaborates_with |
gptkb:international_partners
other government agencies |
gptkbp:conducts_research_on |
emerging cyber threats
|
gptkbp:coordinates_with |
intelligence agencies
law enforcement agencies |
gptkbp:created |
cyber awareness programs
|
gptkbp:development |
cybersecurity frameworks
cybersecurity policies cyber defense strategies incident response plans cybersecurity metrics cybersecurity training materials cybersecurity incident response capabilities |
gptkbp:engages_in |
gptkb:public_outreach
risk management threat hunting cybersecurity policy advocacy cybersecurity policy development cybersecurity research and development cybersecurity risk assessments cybersecurity awareness campaigns cyber defense exercises cybersecurity strategy development cybersecurity threat analysis cybersecurity incident management cyber threat modeling |
gptkbp:enhances |
cyber resilience
|
gptkbp:evaluates |
cybersecurity posture
cybersecurity risks |
gptkbp:facilitates |
information sharing
|
gptkbp:focus |
defending against cyber threats
|
gptkbp:fosters |
partnerships with private sector
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Protection Teams
|
gptkbp:is_implemented_in |
security measures
|
gptkbp:management |
cybersecurity incidents
|
gptkbp:monitors |
network security
|
gptkbp:operate_within |
gptkb:Department_of_Defense
|
gptkbp:participated_in |
policy development
joint exercises training exercises cybersecurity forums cybersecurity competitions cybersecurity assessments cybersecurity workshops |
gptkbp:performed_in |
vulnerability assessments
|
gptkbp:provides |
technical assistance
cybersecurity training cybersecurity guidance cybersecurity assessments cybersecurity consulting services |
gptkbp:provides_support_for |
incident response
|
gptkbp:reports_to |
gptkb:military_leadership
cybersecurity trends |
gptkbp:responds_to |
cyber incidents
|
gptkbp:shares |
cyber threat information
|
gptkbp:support |
gptkb:military_operations
cybersecurity research cybersecurity initiatives national security objectives critical infrastructure protection cybersecurity operations cybersecurity training programs cybersecurity research initiatives cybersecurity awareness initiatives cybersecurity compliance efforts |
gptkbp:trains |
personnel in cybersecurity
|
gptkbp:utilizes |
advanced cybersecurity tools
|
gptkbp:bfsParent |
gptkb:Fort_Gordon
gptkb:U._S._Cyber_Command |
gptkbp:bfsLayer |
4
|