Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
AFCEA Bethesda March 2014 Breakfast
Tuesday - 1/29/2013, 6:41pm EST
The growing number of cyber attacks on Federal government networks are increasing in sophistication, becoming more aggressive, more dynamic and agencies are quickly looking to implement continuous monitoring methods, diagnosis and mitigation tools.
Agencies are moving forward quickly in part due to an Office of Management and Budget (OMB) memo calling agencies to develop a security control continuous monitoring strategy by the end of February 2014 in cooperation with the Department of Homeland Security (DHS). The first task order off of the DHS Continuous Diagnostics and Mitigation (CDM) contract vehicle - managed by the General Services Administration (GSA) Federal Systems Integration and Management Center (FEDSIM) - was awarded in January.
Join AFCEA Bethesda on March 7, 2014, for "Continuous Diagnostics and Mitigation 2014 Outlook," a breakfast panel with top federal IT and security leaders on the state of the CDM program and how agencies are using their own funding to implement the software and services for specific applications or systems.
click here to register.