Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
DHS issues RFI for vendors to protect .gov domain
Wednesday - 7/15/2009, 4:56pm EDT
The Homeland Security Department wants to know how vendors would protect the .gov domain.
In a request for information issued today on FedBizOpps.gov, DHS Office of Cybersecurity and Communications, National Cyber Security Division wants to know how contractors would provide a technical, end-to-end solution to accomplish this goal.
DHS wants information around these specific areas:
- Alert, warning and analysis, which includes compiling and analyzing information about cyber security and inform federal, state, and local government agencies, private sector partners, infrastructure owners and operators, and the public about current and potential cybersecurity threats and vulnerabilities.
- Coordination and collaboration, which includes information sharing of cyber activity with public and private sector;
- Response and assistance, which includes vulnerability analysis, threat, attack, detection and mitigation assistance and help developing enforcement and compliance policies;
- Protect and detect, which includes coordination of security from Trusted Internet Connections and analyzing network traffic to identify emerging threats, detect cyber threats using traffic flow analysis, intrusion detection tools, commercial vulnerability data feeds, and open-source mechanisms.
Reponses are due July 22.
On the Web:
FedBizOpps -- DHS RFI for cybersecurity
FederalNewsRadio -- DHS relooking at how to classify cyber incidents