Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The 8th annual IT Security Automation Conference
Tuesday - 9/25/2012, 9:20pm EDT
The concept of security and the federal government is inevitably wrapped in guidance from National Institute of Standards and Technology NIST.
On October 3, 2012, NIST is working with a wide range of members of the security community to produce the 8th Annual IT Security Automation Conference.
Today's interview is with Dave Waltermire, security automation architect, in NIST's Computer Security Division.
Waltermire will give us an overview of the overview of the conference, and talk about security automation, the history of SCAP, competing standards, the challenges of generating standards, and the role the federal government in this process.
The conference will cover continuous monitoring, software assurance, incident handling, analytics, as well as trusted computing.