Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
Stiennon: Cyberwar could create broad fallout
Wednesday - 12/15/2010, 7:30pm EST
Stiennon's new book, "Surviving Cyberwar," outlines a defense against cyber attacks.
In an interview with In Depth's Francis Rose, Stiennon said that even if an organization is not threatened by a state-backed attack -- say, from China -- the attacks will create "collatoral damage."
"There will be fallout from cyberwar that impacts you no matter what walk of life you are," he said.
Stiennon pointed to the tools used in the Stuxnet worm that is now being copies in "broadly distributed toolkits."
For the Defense Department to be prepared for future attacks, the agency will have to assign responsibility "pushed down to every level," Stiennon said.
He added that Congress will have to create an organization that has budgetary control over cybersecurity.
Especially in the age of WikiLeaks, agencies should be proactive by monitoring network behavior and warning employees that they are being monitored.
Stiennon blogs at Threat Chaos.