Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
GAO applauds DHS critical infrastructure protection plan
Thursday - 4/8/2010, 8:30am EDT
- The Homeland Security Department's received high grades from government auditors for keeping on top of critical infrastructure protection. The Government Accountability Office praised a recent update of the DHS National Infrastructure Protection Plan. The plan deals with protecting power distribution, water treatment and supply, telecommunications, national defense and emergency services, including the cyber systems that control them. SC Magazine reports, the GAO liked the risk management approach taken by DHS and its emphasis on regional approaches to cyber breaches.
- A slumping economy fuels a rise in cybercrime coming from within organizations. A Verizon report on data loss found that 2-in-10 breaches last year came from people with insider knowledge of firms. And that number is going up. The San Fransisco Chronicle cites local law enforcement as saying the inability to find employment has been a recurrent motivation behind new cases of identity theft and software piracy.