Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
How to improve federal security
Tuesday - 1/1/2013, 9:35pm EST
Because of cloud adoption, multitudes of malicious code writers, and an inundation of mobile devices, anyone who manages security has to steal this software development concept of nonstop vigilance.
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group, join host John Gilroy on today's show to discuss improvements in cyber security.
One focus of the discussion is a recent report from the Center for Strategic & International Studies (CSIC) called "Updating U.S. Federal Cyber Security Policy and Guidance."
During the interview, Evans draws upon her experience in a wide range of federal activities to show how continuous monitoring acts to monitor, measure, and mitigate attacks. She details ways that current authorities can be implemented to reduce risk.
Anderson talks about some of the pioneering work on security done by the State Department and how it can be applied to a wider range of federal agencies.
She suggests that applying some of the recommendations of the CSIS report will assist agencies in addressing the highest risks and prevent wasteful duplication.