Properties (59)
Predicate | Object |
---|---|
gptkbp:instanceOf |
fund
|
gptkbp:addresses |
cyber threats
information systems |
gptkbp:aimsTo |
national security
collaboration among stakeholders incident response capabilities cyber hygiene practices cybercrime incidents cybersecurity professionals cybersecurity infrastructure cybersecurity awareness campaigns cybersecurity partnerships. information sharing among sectors public trust in cybersecurity |
gptkbp:collaboratesWith |
private sector
|
gptkbp:compatibleWith |
cybersecurity projects
|
gptkbp:conducts |
cybersecurity awareness
|
gptkbp:developsStrategiesFor |
cyber defense
|
gptkbp:encouragesParticipationIn |
cybersecurity solutions
cybersecurity policies cybersecurity efforts |
gptkbp:engagesIn |
public outreach
|
gptkbp:established |
government
|
gptkbp:facilitates |
law enforcement
|
gptkbp:focusArea |
cybersecurity
|
gptkbp:funding |
grants
|
gptkbp:hasPartnershipsWith |
academic institutions
|
https://www.w3.org/2000/01/rdf-schema#label |
National Cybersecurity Fund
|
gptkbp:isBeneficialFor |
organizations
|
gptkbp:issuedBy |
gptkb:Department_of_Homeland_Security
|
gptkbp:operationalStatus |
2020
|
gptkbp:promotes |
cybersecurity best practices
cybersecurity workforce |
gptkbp:provides |
nonprofits
cybersecurity competitions cybersecurity research projects |
gptkbp:providesAccessTo |
cybersecurity tools
|
gptkbp:providesGuidanceOn |
cybersecurity regulations
|
gptkbp:providesOpportunitiesFor |
collaboration among agencies
|
gptkbp:providesResourcesFor |
training programs
cybersecurity_incident_management |
gptkbp:providesSupportFor |
research and development
vulnerable communities |
gptkbp:providesTrainingFor |
cybersecurity analysts
|
gptkbp:purpose |
support cybersecurity initiatives
|
gptkbp:receives_funding_from |
enhance public safety
|
gptkbp:receivesFundingFrom |
federal budget
|
gptkbp:supportRole |
schools
|
gptkbp:supports |
cybersecurity frameworks
protect critical infrastructure emerging cyber threats cybersecurity standards cybersecurity technologies cybersecurity fields secure supply chains combat cyber espionage |
gptkbp:usesTechnology |
state and local governments
|
gptkbp:worksWith |
international partners
cyber resilience |