Properties (91)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Government Agency
|
gptkbp:advises |
Government on Cybersecurity Issues
|
gptkbp:collaboratesWith |
Private Sector
Academic Institutions Technology Companies Non-Governmental_Organizations Cybersecurity_Research_Institutions |
gptkbp:conducts |
Risk Assessments
Security Audits Vulnerability Assessments Threat Intelligence Sharing Cybersecurity Training Workshops Cybersecurity_Awareness_Programs Cybersecurity_Research_Studies Cybersecurity_Risk_Management_Assessments |
gptkbp:coordinatesWith |
Law Enforcement Agencies
International_Cybersecurity_Organizations |
gptkbp:develops |
Incident Response Plans
Cybersecurity Frameworks Cybersecurity Policies Cybersecurity Standards Cybersecurity Metrics Cybersecurity_Awareness_Campaigns Cybersecurity_Incident_Response_Plans Cybersecurity_Incident_Management_Procedures Cybersecurity_Incident_Reporting_Frameworks Cybersecurity_Incident_Response_Protocols Cybersecurity_Incident_Response_Strategies Cybersecurity_Risk_Management_Frameworks |
gptkbp:engagesIn |
Public Awareness Campaigns
International Cooperation Public Outreach Cybersecurity Exercises Cybersecurity Policy Advocacy Cybersecurity_Policy_Development Cybersecurity_Research_Initiatives Cybersecurity_Community_Outreach Cybersecurity_Policy_Research Cybersecurity_Community_Building Cybersecurity_Public_Policy_Advocacy |
gptkbp:establishedIn |
2015
|
gptkbp:facilitates |
Public-Private_Partnerships
|
gptkbp:focusesOn |
Cybersecurity
|
gptkbp:headquarteredIn |
Country X
|
https://www.w3.org/2000/01/rdf-schema#label |
Cybersecurity Authority
|
gptkbp:issues |
Cybersecurity Best Practices
Cybersecurity Compliance Guidelines Cybersecurity Policy Recommendations Cybersecurity_Regulations Cybersecurity_Alerts Cybersecurity_Awareness_Publications Cybersecurity_Guidelines_for_Businesses Cybersecurity_Incident_Reports Cybersecurity_Incident_Response_Guidelines Cybersecurity_Risk_Management_Guidelines |
gptkbp:manages |
gptkb:National_Cybersecurity_Incident_Response_Center
|
gptkbp:monitors |
Cyber Threats
Emerging Cyber Threats Critical Infrastructure Security Cybersecurity Compliance Cybersecurity Threat Landscape Cybersecurity Policy Compliance |
gptkbp:oversees |
National Cybersecurity Strategy
|
gptkbp:participatesIn |
Cybersecurity_Conferences
|
gptkbp:promotes |
Cyber Hygiene Practices
Research in Cybersecurity |
gptkbp:provides |
Technical Assistance
Training for Professionals Incident Reporting Mechanisms Guidelines for Cybersecurity Cybersecurity_Certifications Cybersecurity_Tools Cybersecurity_Risk_Management_Tools Cybersecurity_Incident_Management_Training Cybersecurity_Risk_Assessment_Tools Cybersecurity_Awareness_Resources Cybersecurity_Incident_Management_Resources Cybersecurity_Incident_Reporting_Tools Cybersecurity_Incident_Response_Training |
gptkbp:publishes |
Annual Reports
|
gptkbp:supports |
Incident Response Teams
Cybersecurity Competitions Cybersecurity Startups Cybersecurity_Research_Collaborations Cybersecurity_Workforce_Development Cybersecurity_Innovation_Programs Cybersecurity_Research_Fellowships Cybersecurity_Research_Grants Cybersecurity_Education_Initiatives Cybersecurity_Education_Programs Cybersecurity_Workforce_Training_Programs |