Statements (89)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:legislation
|
gptkbp:addresses |
cybersecurity workforce development
|
gptkbp:aims_to_improve |
cybersecurity measures
|
gptkbp:amends |
gptkb:Federal_Information_Security_Management_Act
|
gptkbp:date_enacted |
gptkb:2015
|
gptkbp:enacted_by |
gptkb:United_States_Congress
|
gptkbp:encourages |
private sector investment in cybersecurity solutions
|
gptkbp:establishes |
gptkb:National_Cybersecurity_Center_of_Excellence
|
gptkbp:facilitates |
collaboration with international partners on cybersecurity issues
|
gptkbp:has_implications_for |
privacy rights
|
https://www.w3.org/2000/01/rdf-schema#label |
Cybersecurity Act
|
gptkbp:includes |
provisions for critical infrastructure protection
|
gptkbp:is_analyzed_in |
policy think tanks
|
gptkbp:is_associated_with |
cybersecurity risk management frameworks
|
gptkbp:is_cited_in |
subsequent cybersecurity legislation
|
gptkbp:is_connected_to |
national security policies
national defense initiatives information security policies information technology policies |
gptkbp:is_criticized_for |
lack of transparency
civil rights groups civil liberties organizations insufficient funding privacy advocates lack of clear definitions potential overreach in data collection |
gptkbp:is_discussed_in |
gptkb:academic_conferences
gptkb:international_forums gptkb:media_coverage government meetings policy debates congressional hearings legal forums academic research on cybersecurity policy |
gptkbp:is_evaluated_by |
risk management frameworks
government reports independent auditors cybersecurity experts cybersecurity assessments cybersecurity audits |
gptkbp:is_implemented_in |
gptkb:Department_of_Homeland_Security
|
gptkbp:is_influenced_by |
gptkb:National_Academy_of_Sciences
emerging technologies cybersecurity frameworks cybersecurity incidents global cybersecurity trends |
gptkbp:is_informed_by |
cybersecurity best practices
|
gptkbp:is_linked_to |
data protection laws
emergency response protocols cybersecurity awareness training emergency response strategies emergency management policies |
gptkbp:is_monitored_by |
gptkb:government_agency
|
gptkbp:is_part_of |
federal cybersecurity initiatives
cybersecurity legislation history national cybersecurity framework federal cybersecurity strategy U. S. national security strategy U. S. cybersecurity strategy national cybersecurity agenda U. S. cybersecurity landscape U. S. cybersecurity policy framework U. S. digital economy strategy federal cybersecurity policy. |
gptkbp:is_promoted_by |
government agencies
industry associations |
gptkbp:is_promoted_through |
gptkb:educational_programs
public awareness campaigns |
gptkbp:is_referenced_in |
government publications
policy documents cybersecurity training programs legal analyses |
gptkbp:is_related_to |
gptkb:Cybersecurity_Information_Sharing_Act
data breach response |
gptkbp:is_reviewed_by |
Congressional committees on cybersecurity
|
gptkbp:is_subject_to |
judicial review
|
gptkbp:is_supported_by |
non-profit organizations
academic institutions technology companies law enforcement agencies cybersecurity advocacy groups business coalitions technology associations |
gptkbp:promotes |
information sharing between private and public sectors
|
gptkbp:provides |
liability protections for cybersecurity information sharing
|
gptkbp:requires |
federal agencies to adopt cybersecurity frameworks
|
gptkbp:supports |
research and development in cybersecurity technologies
|
gptkbp:bfsParent |
gptkb:European_Union
|
gptkbp:bfsLayer |
4
|