home / openregs / federal_register

federal_register: E8-30979

All Federal Register documents (rules, proposed rules, notices, presidential documents) from 1994 to present. Nearly 1M documents with full-text search.

Data license: Public Domain (U.S. Government data) · Data source: Federal Register API & Regulations.gov API

This data as json

document_number title type abstract publication_date pub_year pub_month html_url pdf_url agency_names agency_ids excerpts regulation_id_numbers
E8-30979 Request for Input No. 2 (RFI-2)-National Cyber Leap Year Notice This request is being issued as the second for the National Cyber Leap Year under the Comprehensive National Cybersecurity Initiative (CNCI). The goal of the National Cyber Leap Year is to identify the most promising game-changing ideas with the potential to reduce vulnerabilities to cyber exploitations by altering the cybersecurity landscape. The first RFI prompted over 160 responses; indicating a strong interest from the technical community to participate. This RFI-2 expands the opportunities for participation by permitting submitters to designate parts of submissions as proprietary. Continued multidisciplinary contributions from organizations with cybersecurity interests are strongly encouraged. Overview: This Request for Information No. 2 (RFI-2) is the second issued under the Comprehensive National Cybersecurity Initiative (CNCI), established within Homeland Security Presidential Directive (HSPD)-23. RFI-2 was developed by the Networking and Information Technology Research and Development (NITRD) Program Senior Steering Group (SSG) for Cybersecurity to invite participation in a National Cyber Leap Year whose goal is an integrated national approach to make cyberspace safe for the American way of life. Over 160 responses were submitted to the first RFI issued by the NITRD SSG (October 14, 2008), indicating a strong desire by the technical community to participate. RFI-2 expands the opportunities for participation by permitting submitters to designate parts of submissions as proprietary. Background: We are a cyber nation. The U.S. information infrastructure--including telecommunications and computer networks and systems and the data that reside on them--is critical to virtually every aspect of modern life. This information infrastructure is increasingly vulnerable to exploitation, disruption, and destruction by a growing array of adversaries. The President's CNCI plan calls for leap-ahead research and technology to reduce vulnerabilities to asymmetric attack in cyberspace. Unlike many research agenda that aim for steady progress in the advancement of science, the leap-ahead effort seeks just a few revolutionary ideas with the potential to reshape the landscape. These game-changing technologies (or non- technical mechanisms that are made possible through technology), developed and deployed over the next decade, will fundamentally change the cyber game into one where the good guys have an advantage. Leap- ahead technologies are so-called because they enable us to leap over the obstacles preventing us from being where we want to be. These advances may require years of concerted research and development to be fully realized; good ideas often do. However, the intent is to start now and gain momentum as intermediate results emerge. Objective: The National Cyber Leap Year has two main goals: (1) Constructing a national research and technology agenda that both identifies the most promising ideas and describes the strategy that brings those ideas to fruition; and (2) jumpstarting game-changing, multi-disciplinary development efforts. The Leap Year will run during fiscal year 2009, and will comprise two stages: prospecting and focusing. Stage One canvasses the cybersecurity community for ideas. Our aim is to hear from all those who wish to help. The heart of Stage Two, which begins February 1, 2009, is a series of workshops to explore the best ideas from Stage One. As the year progresses, we will publish four types of findings: (1) Game-changers--descriptions of the paradigm-busters that technology will make possible; (2) Technical Strategy--as specifically as possible, the invention and/or research that needs to be done; (3) Productization/Implementation--how the capability will be packaged, delivered, and used, and by whom; and (4) Recommendations-- prescriptions for success, to include funding, policies, authorities, tasking--whatever would smooth the way to realization of the game- changing capability. Deadline for Submission under this RFI-2: The second round of the Stage One cycle is covered by this RFI-2 and will close February 20, 2009. Subsequent cycles will be announced by separate RFIs. All Stage One cycles are expected to be complete by April 15, 2009. 2008-12-30 2008 12 https://www.federalregister.gov/documents/2008/12/30/E8-30979/request-for-input-no-2-rfi-2-national-cyber-leap-year https://www.govinfo.gov/content/pkg/FR-2008-12-30/pdf/E8-30979.pdf National Science Foundation 366 This request is being issued as the second for the National Cyber Leap Year under the Comprehensive National Cybersecurity Initiative (CNCI). The goal of the National Cyber Leap Year is to identify the most promising game-changing ideas with the...  

Links from other tables

  • 1 row from document_number in federal_register_agencies
  • 1 row from fr_document_number in fr_regs_crossref
Powered by Datasette · Queries took 6.47ms · Data license: Public Domain (U.S. Government data) · Data source: Federal Register API & Regulations.gov API