The Department of Homeland Security (DHS) Cybersecurity Infrastructure Security Agency (CISA) is charged with enhancing the security, resiliency, and reliability of the nation's cyber, communications, and physical infrastructure, as well as with supporting DHS’s mission to manage risk. CISA will use this survey to identify opportunities to improve our products and services, we ask that you please take 5 minutes to complete this anonymous and voluntary survey to understand your expectations and values, so we may use the information to help us bring those expectations and values to reality. Thank you.
Please note CISA does not intend to collect any Personally Identifiable Information (PII) such as respondent contact information (names, organizations, phone numbers, email addresses). Please do not provide any PII in the open text fields.
PRA Burden Statement: The public reporting burden to complete this information collection is estimated at 5 minutes per response, including the time completing and reviewing the collected information. The collection of this information is voluntary. An agency may not conduct or sponsor, and a person is not required to respond to a collection of information unless it displays a currently valid OMB control number and expiration date. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to DHS/CISA. Mail Stop 0608, 245 Murray Lane SW, Arlington, VA 20598. ATTN: PRA [1670-0027].
CYBER+INFRASTRUCTURE
Please rate the product’s overall value:
Very valuable
Somewhat valuable
Of limited value
Not valuable
Please rate the product’s utility:
Highly actionable – shaped and/or strengthened <Enter cybersecurity, infrastructure, or risk management> policy or implementation (e.g. signature development, deemed shareable)
Actionable – helped existing security posture or confidence
Not actionable – did not contain usable/actionable information (e.g. TTPs, indicators)
Please rate the product’s quality of analysis:
High quality analysis – uniquely insightful, drove organizational strategic decisions, or drove significant operational/tactical actions
Acceptable quality analysis – reinforced or corroborated other sources’ analysis
Low quality analysis – did not address key questions and/or contained errors that eroded confidence in recommended actions
Please rate the product’s timeliness:
Very timely – helped organization to stay ahead of emerging threats (e.g. campaign, zero-days)
Timely – helped organization to confirm known information and/or address existing challenges
Not timely – information was provided after organization needed it, information was available earlier from other sources, or information was no longer relevant for defensive action
What else did you find particularly useful or lacking in the product?
[open text box]
What improvements can be made to the product to better suit your needs?
[open text box]
How frequently do you use CISA products?
Very frequently
Frequently
Infrequently
Very infrequently
How do you use CISA products? (please select all that apply)
Daily network operations
Situational awareness
When an event affects my organization
Personal interest
I do not use CISA products
What other sources do you use for cybersecurity threat or vulnerability information alerts? (please select all that apply)
Federal Law Enforcement (ICE, USSS)
The Intelligence Community (FBI, NSA, CIA)
Private Sector Cybersecurity Vendors
I only use CISA sources
I was unaware of other sources
Other, please identify: [open text box]
How do CISA products compare to other sources from which you receive information?
Excellent (exceeding the value, quality, and timeliness of the other products available; very actionable).
Good (valuable to organizational <Enter cybersecurity, infrastructure, or risk management>; matches quality and detail of similar products; actionable in cybersecurity; sufficiently timely).
Satisfactory (less valuable but actionable, lower quality, or less timely).
Poor (lower value, not actionable, poor quality, or not timely).
I do not use information from other sources.
What is your role in <enter cybersecurity, infrastructure, or risk management> for your organization?
< Enter cybersecurity, infrastructure, or risk management roles>
< Enter cybersecurity, infrastructure, or risk management roles>
< Enter cybersecurity, infrastructure, or risk management roles>
< Enter cybersecurity, infrastructure, or risk management roles>
I do not play a <Enter cybersecurity, infrastructure, or risk management> role for my organization
Other, please identify: [open text box]
Please describe your organization: (please select all that apply)
U.S. Federal Government Department or Agency
U.S. State, Local, Tribal, or Territorial Government
Non-U.S. Government
Non-U.S. Citizen
Private Sector
Academia
Nonprofit
Critical Infrastructure
Cybersecurity Vendor/Provider
Individual: Citizen/Retired/Student/etc.
None of the above
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | LECOMPTE, JENNIFER (CTR) |
File Modified | 0000-00-00 |
File Created | 2021-06-17 |