TY - BOOK AU - National Research Council TI - A Review of U.S. Navy Cyber Defense Capabilities: Abbreviated Version of a Classified Report DO - 10.17226/21663 PY - 2015 UR - https://nap.nationalacademies.org/catalog/21663/a-review-of-us-navy-cyber-defense-capabilities-abbreviated-version PB - The National Academies Press CY - Washington, DC LA - English KW - Conflict and Security Issues KW - Computers and Information Technology AB - In order to conduct operations successfully and defend its capabilities against all warfighting domains, many have warned the Department of Defense (DoD) of the severity of the cyber threat and called for greater attention to defending against potential cyber attacks. For several years, many within and outside DoD have called for even greater attention to addressing threats to cyberspace. At the request of the Chief of Naval Operations, the National Research Council appointed an expert committee to review the U.S. Navy's cyber defense capabilities. The Department of the Navy has determined that the final report prepared by the committee is classified in its entirety under Executive Order 13526 and therefore cannot be made available to the public. A Review of U.S. Navy Cyber Defense Capabilities is the abbreviated report and provides background information on the full report and the committee that prepared it. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine A2 - Anne Johnson A2 - Emily Grumbling TI - Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop SN - DO - 10.17226/25488 PY - 2019 UR - https://nap.nationalacademies.org/catalog/25488/implications-of-artificial-intelligence-for-cybersecurity-proceedings-of-a-workshop PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology AB - In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop. ER - TY - BOOK TI - PY - UR - PB - The National Academies Press CY - Washington, DC LA - English ER - TY - BOOK AU - National Research Council TI - Naval Studies Board 40th Anniversary: 1974-2014 SN - DO - 10.17226/19543 PY - 2014 UR - https://nap.nationalacademies.org/catalog/19543/naval-studies-board-40th-anniversary-1974-2014 PB - The National Academies Press CY - Washington, DC LA - English KW - Biography and Autobiography KW - Conflict and Security Issues AB - Forty years ago the Naval Studies Board was created at the request of then Chief of Naval Operations Admiral Elmo R. Zumwalt, Jr. As stated in his request to the National Academy of Sciences, he thought it important for the Navy to have an outside resource to which it could turn "for independent and outside counsel on any area of its responsibilities involving the interplay of scientific and technical matters with other national issues." Admiral Zumwalt, together with Under Secretary of the Navy Honorable David S. Potter and President of the National Academy of Sciences Dr. Philip Handler, recognized the importance of not only continuing but also focusing and strengthening the relationship that had existed between the National Academy of Sciences and the Department of the Navy since the Academy's creation in 1863. To commemorate this special anniversary, Naval Studies Board 40th Anniversary provides an overview of the history, mission, and accomplishments of the Board. In the coming years, the Naval Studies Board will continue to serve as a source of independent, long-range, scientific and technical planning advice for the nation's naval forces. It will also work to ensure that the relationships between the operational, science, engineering, and technical communities remain as strong and productive as ever to ensure that progress continues in areas most critical to meeting future naval forces’ needs. ER - TY - BOOK A2 - Linda Casola TI - The Gates Are Open: Control System Cyber-Physical Security for Facilities: Proceedings of a Federal Facilities Council Workshop—in Brief PY - 2021 UR - https://nap.nationalacademies.org/catalog/26357/the-gates-are-open-control-system-cyber-physical-security-for-facilities PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology AB - The expanding connectivity of operational technologies (OT) increases the vulnerability of facilities to cyber attacks. Many of these technologies were not designed for a "smart" environment and are thus unsecure. Furthermore, these devices often continue to be overlooked when considering overall building security, which can lead to significant losses. On August 10, 2021, the National Academies of Sciences, Engineering, and Medicine's Federal Facilities Council convened a virtual workshop to discuss OT security within facilities. Workshop panelists and participants explored existing vulnerabilities, new legislation and guidance, the convergence of cyber and physical security, and strategies to mitigate risk. This publication summarizes the presentation and discussion of the workshop. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine TI - Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration SN - DO - 10.17226/26105 PY - 2021 UR - https://nap.nationalacademies.org/catalog/26105/looking-ahead-at-the-cybersecurity-workforce-at-the-federal-aviation-administration PB - The National Academies Press CY - Washington, DC LA - English KW - Industry and Labor KW - Computers and Information Technology AB - The Federal Aviation Administration (FAA) has overseen significant upgrades to the technology used to manage aviation operations to increase the safety and efficiency of the National Airspace System (NAS). Though necessary to regular operations, these modern computing and communications systems provide a greater attack surface for criminals, terrorists, or nation-states to exploit and thereby increase the potential for cybersecurity threats to the NAS and its constituents. The future safety and security of air travel will rely in part on the ability of the FAA to build a workforce capable of addressing the evolving cybersecurity threat landscape. Securing the computers, networks, and data that underpin modern aviation depends in part on the FAA having enough cybersecurity professionals (capacity) with the right knowledge, skills, and abilities (capability)). It also depends on the FAA's workforce having sufficient diversity of backgrounds and experience. Such diversity is critical in analyzing cybersecurity problems and widely understood to be a "functional imperative" for effective cybersecurity programs. At the request of Congress, the publication examines the FAA's cybersecurity workforce challenges, reviews the current strategy for meeting those challenges, and recommends ways to strengthen the FAA's cybersecurity workforce. ER - TY - BOOK AU - National Research Council TI - Information Assurance for Network-Centric Naval Forces SN - DO - 10.17226/12609 PY - 2010 UR - https://nap.nationalacademies.org/catalog/12609/information-assurance-for-network-centric-naval-forces PB - The National Academies Press CY - Washington, DC LA - English KW - Space and Aeronautics KW - Conflict and Security Issues AB - Owing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval 'mission assurance'. ER - TY - BOOK AU - National Research Council TI - Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy SN - DO - 10.17226/12997 PY - 2010 UR - https://nap.nationalacademies.org/catalog/12997/proceedings-of-a-workshop-on-deterring-cyberattacks-informing-strategies-and PB - The National Academies Press CY - Washington, DC LA - English KW - Conflict and Security Issues KW - Computers and Information Technology AB - In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed. ER - TY - BOOK AU - National Research Council TI - Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence SN - DO - 10.17226/13260 PY - 2011 UR - https://nap.nationalacademies.org/catalog/13260/review-of-the-national-defense-intelligence-colleges-masters-degree-in-science-and-technology-intelligence PB - The National Academies Press CY - Washington, DC LA - English KW - Education KW - Behavioral and Social Sciences AB - The National Research Council (NRC) was asked by the National Defense Intelligence College (NDIC) to convene a committee to review the curriculum and syllabi for their proposed master of science degree in science and technology intelligence. The NRC was asked to review the material provided by the NDIC and offer advice and recommendations regarding the program's structure and goals of the Master of Science and Technology Intelligence (MS&TI) program. The Committee for the Review of the Master's Degree Program for Science and Technology Professionals convened in May 2011, received extensive briefings and material from the NDIC faculty and administrators, and commenced a detailed review of the material. This letter report contains the findings and recommendations of the committee. Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence centers on two general areas. First, the committee found that the biological sciences and systems engineering were underrepresented in the existing program structure. Secondly, the committee recommends that the NDIC faculty restructure the program and course learning objectives to focus more specifically on science and technology, with particular emphasis on the empirical measurement of student achievement. Given the dynamic and ever-changing nature of science and technology, the syllabi should continue to evolve as change occurs. ER - TY - BOOK AU - National Research Council TI - Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making SN - DO - 10.17226/18446 PY - 2013 UR - https://nap.nationalacademies.org/catalog/18446/professionalizing-the-nations-cybersecurity-workforce-criteria-for-decision-making PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Education KW - Industry and Labor AB - Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education—as well as organizations that employ cybersecurity workers—could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine TI - Enabling DoD's Test Ranges and Infrastructure to Meet Threats and Operational Needs in the 21st Century: Unclassified Summary DO - 10.17226/26607 PY - 2022 UR - https://nap.nationalacademies.org/catalog/26607/enabling-dods-test-ranges-and-infrastructure-to-meet-threats-and-operational-needs-in-the-21st-century PB - The National Academies Press CY - Washington, DC LA - English KW - Conflict and Security Issues AB - The Department of Defense operates several ranges across all service branches to test the effectiveness of military systems in the land, sea, air, space, and cyberspace domains. These ranges and infrastructure represent a critical part of the DoD acquisition and systems development process. The DoD's Office of Test and Evaluation (DOT&E) has asked the Board on Army Research and Development to assess how effectively these ranges fulfill DOT&E's mission to determine operational effectiveness and lethality of systems currently under development. This study will specifically evaluate whether these ranges are prepared to simulate threats, countermeasures, and operations against near-peer adversaries. This publication is the unclassified version of the classified report. ER - TY - BOOK AU - Transportation Research Board AU - National Academies of Sciences, Engineering, and Medicine A2 - Countermeasures Assessment and Security Experts LLC A2 - Western Management and Consulting LLC TI - Protection of Transportation Infrastructure from Cyber Attacks: A Primer DO - 10.17226/23516 PY - 2016 UR - https://nap.nationalacademies.org/catalog/23516/protection-of-transportation-infrastructure-from-cyber-attacks-a-primer PB - The National Academies Press CY - Washington, DC LA - English KW - Transportation and Infrastructure AB - TRB's Protection of Transportation Infrastructure from Cyber Attacks: A Primer provides transportation organizations with reference materials concerning cybersecurity concepts, guidelines, definitions, and standards. The primer is a joint product of two TRB Cooperative Research Programs, and is categorized as Transit Cooperative Research Program (TCRP) Web-Only Document 67 and National Cooperative Highway Research Program (NCHRP) Web-Only Document 221.The Primer delivers strategic, management, and planning information associated with cybersecurity and its applicability to transit and state DOT operations. It includes definitions and rationales that describe the principles and practices that enable effective cybersecurity risk management. The primer provides transportation managers and employees with greater context and information regarding the principles of information technology and operations systems security planning and procedures.The report is supplemented with an Executive Briefing for use as a 20-minute presentation to senior executives on security practices for transit and DOT cyber and industrial control systems. A PowerPoint summary of the project is also available. ER - TY - BOOK AU - Transportation Research Board AU - National Academies of Sciences, Engineering, and Medicine A2 - Countermeasures Assessment and Security Experts LLC A2 - Western Management and Consulting LLC TI - Protection of Transportation Infrastructure from Cyber Attacks: A Primer DO - 10.17226/23520 PY - 2016 UR - https://nap.nationalacademies.org/catalog/23520/protection-of-transportation-infrastructure-from-cyber-attacks-a-primer PB - The National Academies Press CY - Washington, DC LA - English KW - Transportation and Infrastructure AB - TRB's Protection of Transportation Infrastructure from Cyber Attacks: A Primer provides transportation organizations with reference materials concerning cybersecurity concepts, guidelines, definitions, and standards. The primer is a joint product of two TRB Cooperative Research Programs, and is categorized as Transit Cooperative Research Program (TCRP) Web-Only Document 67 and National Cooperative Highway Research Program (NCHRP) Web-Only Document 221.The Primer delivers strategic, management, and planning information associated with cybersecurity and its applicability to transit and state DOT operations. It includes definitions and rationales that describe the principles and practices that enable effective cybersecurity risk management. The primer provides transportation managers and employees with greater context and information regarding the principles of information technology and operations systems security planning and procedures.The report is supplemented with an Executive Briefing for use as a 20-minute presentation to senior executives on security practices for transit and DOT cyber and industrial control systems. A PowerPoint summary of the project is also available. ER - TY - BOOK AU - National Research Council A2 - David Clark A2 - Thomas Berson A2 - Herbert S. Lin TI - At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues SN - DO - 10.17226/18749 PY - 2014 UR - https://nap.nationalacademies.org/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology AB - We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace. ER - TY - BOOK AU - National Research Council TI - Big Data: A Workshop Report SN - DO - 10.17226/13541 PY - 2012 UR - https://nap.nationalacademies.org/catalog/13541/big-data-a-workshop-report PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Policy for Science and Technology AB - In 2012, the Defense Intelligence Agency (DIA) approached the National Research Council's TIGER standing committee and asked it to develop a list of workshop topics to explore the impact of emerging science and technology. From the list of topics given to DIA, three were chosen to be developed by the Committee for Science and Technology Challenges to U.S. National Security Interests. The first in a series of three workshops was held on April 23-24, 2012. This report summarizes that first workshop which explored the phenomenon known as big data. The objective for the first workshop is given in the statement of task, which explains that that workshop will review emerging capabilities in large computational data to include speed, data fusion, use, and commodification of data used in decision making. The workshop will also review the subsequent increase in vulnerabilities over the capabilities gained and the significance to national security. The committee devised an agenda that helped the committee, sponsors, and workshop attendees probe issues of national security related to so-called big data, as well as gain understanding of potential related vulnerabilities. The workshop was used to gather data that is described in this report, which presents views expressed by individual workshop participants. Big Data: A Workshop Report is the first in a series of three workshops, held in early 2012 to further the ongoing engagement among the National Research Council's (NRC's) Technology Insight-Gauge, Evaluate, and Review (TIGER) Standing Committee, the scientific and technical intelligence (S&TI) community, and the consumers of S&TI products. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine A2 - Evan Elwell TI - Testing, Evaluating, and Assessing Artificial Intelligence–Enabled Systems Under Operational Conditions for the Department of the Air Force: Proceedings of a Workshop—in Brief DO - 10.17226/26885 PY - 2023 UR - https://nap.nationalacademies.org/catalog/26885/testing-evaluating-and-assessing-artificial-intelligence-enabled-systems-under-operational-conditions-for-the-department-of-the-air-force PB - The National Academies Press CY - Washington, DC LA - English KW - Conflict and Security Issues AB - On June 28-30, 2022, the National Academies of Sciences, Engineering, and Medicine Air Force Studies Board (AFSB) convened a hybrid workshop in support of its consensus study on testing, evaluating, and assessing artificial intelligence (AI)-enabled systems under operational conditions.The information summarized in this Proceedings of a Workshop-in Brief reflects the opinions of individual workshop participants. It should not be viewed as a consensus of the workshop participants, the AFSB, or the National Academies. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine TI - Human-AI Teaming: State-of-the-Art and Research Needs SN - DO - 10.17226/26355 PY - 2022 UR - https://nap.nationalacademies.org/catalog/26355/human-ai-teaming-state-of-the-art-and-research-needs PB - The National Academies Press CY - Washington, DC LA - English KW - Behavioral and Social Sciences AB - Although artificial intelligence (AI) has many potential benefits, it has also been shown to suffer from a number of challenges for successful performance in complex real-world environments such as military operations, including brittleness, perceptual limitations, hidden biases, and lack of a model of causation important for understanding and predicting future events. These limitations mean that AI will remain inadequate for operating on its own in many complex and novel situations for the foreseeable future, and that AI will need to be carefully managed by humans to achieve their desired utility. Human-AI Teaming: State-of-the-Art and Research Needs examines the factors that are relevant to the design and implementation of AI systems with respect to human operations. This report provides an overview of the state of research on human-AI teaming to determine gaps and future research priorities and explores critical human-systems integration issues for achieving optimal performance. ER - TY - BOOK AU - National Research Council TI - Realizing the Potential of C4I: Fundamental Challenges SN - DO - 10.17226/6457 PY - 1999 UR - https://nap.nationalacademies.org/catalog/6457/realizing-the-potential-of-c4i-fundamental-challenges PB - The National Academies Press CY - Washington, DC LA - English KW - Conflict and Security Issues KW - Space and Aeronautics AB - Rapid progress in information and communications technologies is dramatically enhancing the strategic role of information, positioning effective exploitation of these technology advances as a critical success factor in military affairs. These technology advances are drivers and enablers for the "nervous system" of the military—its command, control, communications, computers, and intelligence (C4I) systems—to more effectively use the "muscle" side of the military. Authored by a committee of experts drawn equally from the military and commercial sectors, Realizing the Potential of C4I identifies three major areas as fundamental challenges to the full Department of Defense (DOD) exploitation of C4I technology—information systems security, interoperability, and various aspects of DOD process and culture. The book details principles by which to assess DOD efforts in these areas over the long term and provides specific, more immediately actionable recommendations. Although DOD is the focus of this book, the principles and issues presented are also relevant to interoperability, architecture, and security challenges faced by government as a whole and by large, complex public and private enterprises across the economy. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine A2 - Lynette I. Millett A2 - Baruch Fischhoff A2 - Peter J. Weinberger TI - Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions SN - DO - 10.17226/24676 PY - 2017 UR - https://nap.nationalacademies.org/catalog/24676/foundational-cybersecurity-research-improving-science-engineering-and-institutions PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Conflict and Security Issues AB - Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on. Foundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals. ER - TY - BOOK AU - Transportation Research Board AU - National Academies of Sciences, Engineering, and Medicine A2 - David Fletcher A2 - Patricia Bye TI - Cybersecurity in Transit Systems DO - 10.17226/26475 PY - 2022 UR - https://nap.nationalacademies.org/catalog/26475/cybersecurity-in-transit-systems PB - The National Academies Press CY - Washington, DC LA - English KW - Transportation and Infrastructure AB - The COVID-19 pandemic is having a profound effect on every infrastructure sector in North America, including transit systems, and on the information technology and operational technology systems that are embedded in their ongoing operations.The TRB Transit Cooperative Research Program's TCRP Synthesis 158: Cybersecurity in Transit Systems identifies and documents emerging cybersecurity trends related to teleworking/remote worker offices, contactless customer services, real-time information services, transit-on-demand services, and cyber resilience affecting transit agencies now and in the near future as a consequence of the digital acceleration stimulated by the global pandemic of 2020–2021. ER -