Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
How to improve federal security
Tuesday - 1/1/2013, 9:35pm EST
Because of cloud adoption, multitudes of malicious code writers, and an inundation of mobile devices, anyone who manages security has to steal this software development concept of nonstop vigilance.
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group, join host John Gilroy on today's show to discuss improvements in cyber security.
One focus of the discussion is a recent report from the Center for Strategic & International Studies (CSIC) called "Updating U.S. Federal Cyber Security Policy and Guidance."
During the interview, Evans draws upon her experience in a wide range of federal activities to show how continuous monitoring acts to monitor, measure, and mitigate attacks. She details ways that current authorities can be implemented to reduce risk.
Anderson talks about some of the pioneering work on security done by the State Department and how it can be applied to a wider range of federal agencies.
She suggests that applying some of the recommendations of the CSIS report will assist agencies in addressing the highest risks and prevent wasteful duplication.