Definition

Cybersecurity Enhancement Act of 2009 (S.773)

Part of the Network security glossary:

The Cybersecurity Enhancement Act of 2009 (S.773) is United States legislation intended to improve cybersecurity within the federal government and throughout the public and private sectors. To this end, the act establishes research and development (R&D) requirements for federal agencies and promotes public-private partnerships (PPPs).

The Act requires that federal agencies conduct cybersecurity risk assessments and develop and implement R&D plans to address identified risks. Such a plan must detail objectives to be addressed in the short, medium and long terms, as well as the funding required to meet each one. The plan must also explain how the agencies’ near-term objectives complement R&D in the private sector.

The Act mandates a presidential report on the federal government’s cybersecurity workforce needs. The report will identify workforce skills needed by the government to support cybersecurity. To help build a workforce with the requisite skills, the National Science Foundation has been charged with creating fellowships and providing grants for cybersecurity-related research.

According to the Act’s stipulations, the National Institute for Science and Technology (NIST) will develop a public awareness and education plan. NIST will also establish a plan to coordinate the U.S. government’s role in international cybersecurity technical standards development.

 

Learn More About IT:
> The Committee on Science and Technology Web site summarizes the Cybersecurity Enhancement Act of 2009.

This was last updated in March 2011
Posted by: Margaret Rouse

Related Terms

Definitions

  • Chief Risk Officer (CRO)

    - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological risks across the enterprise. (SearchCompliance.com)

  • long-tail intrusion

    - Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and ... (WhatIs.com)

  • breach detection system (BDS)

    - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS t... (WhatIs.com)

Glossaries

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Cybersecurity Enhancement Act of 2009 (S.773)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.