Search Results

Electric Grid Cybersecurity
This report discusses the current state of electric grid cybersecurity, and the interconnected dependency of critical infrastructure with regard to electric sector reliability. It includes discussions of recent developments, cyber and physical security, threats to the grid and supply chain risks, use of artificial intelligence, improvements to grid cybersecurity, recent legislation and other issues for Congress.
Nanotechnology: A Policy Primer
This report provides an overview of nanotechnology, nanomanufacturing, and public understanding of and attitudes toward nanotechnology. Congress has demonstrated continuing support for nanotechnology and has directed its attention primarily to three topics that may affect the realization of this hoped for potential: federal research and development (R&D) in nanotechnology; U.S. competitiveness; and environmental, health, and safety (EHS) concerns.
A Federal Chief Technology Officer in the Obama Administration: Options and Issues for Consideration
In November 2007, Senator Barack Obama announced his intention, if elected President, to appoint a federal chief technology officer (CTO). On April 18, 2009, President Obama appointed Virginia Secretary of Technology, Aneesh P. Chopra, to serve as "America's Chief Technology Officer." This report presents President Obama's vision for the CTO position put forth during his campaign for the presidency and during the presidential transition. It also discusses the potential scope of duties and authorities of the CTO, articulates organizational precedents and challenges for the CTO, reviews some of the activities undertaken by Aneesh Chopra during his tenure as CTO, and identifies issues Congress may choose to consider if it opts to exert oversight or to develop legislation to create the position and/or office of the CTO.
Cybersecurity: Authoritative Reports and Resources, by Topic
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues.
Back to Top of Screen