Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
DHS issues RFI for vendors to protect .gov domain
Wednesday - 7/15/2009, 4:56pm EDT
The Homeland Security Department wants to know how vendors would protect the .gov domain.
In a request for information issued today on FedBizOpps.gov, DHS Office of Cybersecurity and Communications, National Cyber Security Division wants to know how contractors would provide a technical, end-to-end solution to accomplish this goal.
DHS wants information around these specific areas:
- Alert, warning and analysis, which includes compiling and analyzing information about cyber security and inform federal, state, and local government agencies, private sector partners, infrastructure owners and operators, and the public about current and potential cybersecurity threats and vulnerabilities.
- Coordination and collaboration, which includes information sharing of cyber activity with public and private sector;
- Response and assistance, which includes vulnerability analysis, threat, attack, detection and mitigation assistance and help developing enforcement and compliance policies;
- Protect and detect, which includes coordination of security from Trusted Internet Connections and analyzing network traffic to identify emerging threats, detect cyber threats using traffic flow analysis, intrusion detection tools, commercial vulnerability data feeds, and open-source mechanisms.
Reponses are due July 22.
On the Web:
FedBizOpps -- DHS RFI for cybersecurity
FederalNewsRadio -- DHS relooking at how to classify cyber incidents