№ lp_1_2_54879
File format: docx
Character count: 48504
File size: 98 KB
This document outlines the process for developing guidelines for utilizing the Global Cybersecurity Agenda (GCA), based on consultations and feedback from ITU Member States and stakeholders.
Year:
2022
Region / city:
Geneva
Theme:
Cybersecurity, Global Frameworks
Document Type:
Information Document
Institution:
ITU
Author:
ITU Secretary-General
Target Audience:
Member States, ITU stakeholders
Period of validity:
N/A
Approval Date:
18 February 2022
Date of Changes:
N/A
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Year:
2024
Region / City:
United States
Topic:
Cybersecurity, Incident Response
Document Type:
Template
Organization / Institution:
HACS
Author:
HACS
Target Audience:
Contractors, Agencies
Validity Period:
Ongoing
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2021
Region / City:
Massachusetts
Topic:
Cybersecurity, Public Water Supply
Document Type:
Template
Organization / Institution:
Massachusetts Department of Environmental Protection (MassDEP)
Author:
Andrew Hildick-Smith
Target Audience:
Public water and wastewater utilities
Effective Period:
Ongoing
Approval Date:
2021
Date of Last Update:
N/A
Year:
2022
Month:
June
Document status:
Draft
Document identifier:
IMDRF/CYBER WG/N73DRAFT:2022
Topic:
Medical device cybersecurity
Subject:
Software Bill of Materials (SBOM)
Document type:
Regulatory guidance
Authoring group:
Medical Device Cybersecurity Working Group
Organization:
International Medical Device Regulators Forum
Intended stakeholders:
Medical device manufacturers; healthcare providers; regulators; software vendors
Scope:
Medical devices including software-based and in vitro diagnostic devices
Related documents:
IMDRF/CYBER WG/N60FINAL:2020
Copyright holder:
International Medical Device Regulators Forum
Year:
2021
Region / city:
Washington, D.C.
Topic:
Cybersecurity, Automotive Recycling, Vehicle Repair
Document Type:
Letter
Organization:
National Highway Traffic Safety Administration (NHTSA)
Author:
Sandy Blalock, Executive Director
Target Audience:
National Highway Traffic Safety Administration (NHTSA), Automotive Manufacturers
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2023
Region / City:
United States
Theme:
Cybersecurity, Workforce Development
Document Type:
Interview
Organization:
U.S. Department of Homeland Security (DHS)
Author:
Gregory Bird
Target Audience:
Cybersecurity professionals, Human Resources in cybersecurity
Period of Action:
Ongoing
Approval Date:
Not provided
Date of Changes:
Not provided
Year:
2017
Region / city:
Federal Government
Topic:
Cybersecurity, Information Technology
Document type:
Policy Document
Agency / organization:
Office of Personnel Management (OPM)
Author:
Office of Personnel Management (OPM)
Target audience:
Federal agencies, cybersecurity professionals
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2026
Region / City:
N/A
Subject:
Cybersecurity Training
Document Type:
Instructional Guide
Organization / Institution:
DARS
Author:
N/A
Target Audience:
Employees of DARS
Action Period:
N/A
Approval Date:
N/A
Date of Changes:
N/A
Year:
2025
Organization:
NAIC (National Association of Insurance Commissioners)
Project Sponsor:
Miguel Romero
Prepared by:
Koty Henry
Target Audience:
State insurance regulators and licensed insurers
Type of Document:
Project Proposal / Implementation Plan
Relevant Legislation:
Insurance Data Security Model Law #668 (MDL #668)
Related Policy:
Cybersecurity Event Response Plan (CERP), March 17, 2024
Submission Date:
05/26/2025
Key Resources:
NAIC technical and cybersecurity teams, regulatory/legal input, business analysts, project managers, training/support staff, infrastructure (servers/cloud services)
Implementation Steps:
Portal development, testing, deployment, and state utilization survey
Goals:
Centralized reporting of cybersecurity events, improved regulatory compliance, data security, and cross-jurisdiction coordination
Risks/Challenges:
State-specific variations, adoption rate, confidentiality and security validation
Existing Alternatives:
Appian platform or other configurable platforms
Note:
Year
Topic:
Cybersecurity
Document Type:
Template
Organization:
Harbour Investments, Inc.
Target Audience:
Financial advisors, cybersecurity professionals
Year:
2026
Region / City:
United States
Topic:
Cybersecurity, Compliance
Document Type:
Request for Proposal
Agency / Institution:
U.S. Department of Defense
Author:
Unspecified
Target Audience:
Organizations handling Controlled Unclassified Information (CUI)
Period of Application:
Ongoing
Approval Date:
Unspecified
Modification Date:
Unspecified
Year:
2014
Region/City:
United States
Topic:
Cybersecurity
Document Type:
Statement of Work (SOW)
Organization:
Federal Government, Department of Defense (DoD), Intelligence Community (IC)
Author:
Not specified
Target Audience:
Federal agencies, Contractors
Period of Effectiveness:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2023
Region / City:
USA
Topic:
Cybersecurity Services, Risk Assessment, Vulnerability Testing
Document Type:
Template
Agency/Institution:
HACS
Author:
HACS
Target Audience:
Federal Agencies, Contractors
Period of Action:
N/A
Approval Date:
N/A
Modification Date:
N/A
Note:
RFQ Number
Issued to:
Contractors under GSA Multiple Award Schedule (MAS IT)
Type of Document:
Federal solicitation / request for quote
Services:
Highly Adaptive Cybersecurity Services (HACS)
Applicable Regulations:
Federal Acquisition Regulation (FAR) 8.4
NAICS Code:
[Not specified]
PSC Code:
[Not specified]
Performance Location:
[Primary work location specified in RFQ]
Period of Performance:
Base period with option periods from date of award
Overtime Policy:
Approved only by Contracting Officer’s Representative (COR)
Holidays Observed:
Federal holidays and additional days designated by statute, executive order, or proclamation
Submission Requirements:
Signed cover letter by authorized company negotiator
Year:
2025
Region / City:
NASA
Topic:
Cybersecurity
Document Type:
Policy Reference
Agency / Institution:
NASA OCIO
Author:
Cybersecurity Policy Team
Target Audience:
Contract Teams, Programs
Period of Validity:
Ongoing
Approval Date:
March 21, 2025
Modification Date:
Not Provided
Year:
2025
Region / city:
Not specified
Subject:
Cybersecurity, Social Science, Ethical Hacking
Document Type:
Essay
Author:
Papa Mintah-Adu
Target Audience:
Professionals in cybersecurity, social science researchers
Period of Action:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Note:
Contextual Description
Year:
2025
Region / City:
California
Topic:
Regulatory Comments on Utilization Review Process
Document Type:
Official Rulemaking Comment Document
Organization / Institution:
California Division of Workers’ Compensation
Author:
Various commenters including Earl Moss, Tim Madden, Ben Roberts
Effective Period:
Ongoing rulemaking process
Approval Date:
Pending
Amendment Date:
October 17, 2025
Apprentice Utilization Requirements and Good Faith Efforts for Public Works Contracts (July 8, 2024)
Date:
July 8, 2024
Document type:
Contract specification supplement
Subject:
Apprentice utilization requirements
Jurisdiction:
Washington State
Governing laws and regulations:
RCW 39.04.310; WAC 296-127
Responsible agencies:
Washington State Department of Labor and Industries; Washington State Apprenticeship Council
Apprentice utilization threshold:
Minimum 15 percent of project labor hours
Reporting system:
Prevailing Wage Intent & Affidavit (PWIA)
Required forms:
WSDOT Form 424-004
Compliance mechanism:
Certified payrolls and affidavits of wages paid
Enforcement measures:
Penalties for noncompliance; incentives for meeting requirements
Applicability:
Contractors and subcontractors on public works contracts
Coverage scope:
All tiers and applicable scopes of work
Source type:
Regulatory contract provision establishing mandatory labor participation standards and documentation requirements for apprentices on public construction projects.
Note:
Year
Topic:
Space Utilization
Document Type:
Questionnaire
Year:
2020
Region / City:
United States
Theme:
Healthcare, IT Infrastructure
Document Type:
Technical Guide
Organization:
Department of Veterans Affairs
Author:
REDACTED
Target Audience:
IT professionals, Systems Administrators
Period of Validity:
Ongoing
Approval Date:
June 2020
Revision History:
Available within document
Year:
2025
Region / City:
Mbeya Region, Rungwe District
Document Type:
Dissertation
Organization:
Open University of Tanzania
Author:
Donald D. Kibhutia
Target Audience:
Academics, Researchers, Policymakers
Period of Validity:
Not specified
Approval Date:
Not specified
Modification Date:
Not specified