Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
Stiennon: Cyberwar could create broad fallout
Wednesday - 12/15/2010, 7:30pm EST
Stiennon's new book, "Surviving Cyberwar," outlines a defense against cyber attacks.
In an interview with In Depth's Francis Rose, Stiennon said that even if an organization is not threatened by a state-backed attack -- say, from China -- the attacks will create "collatoral damage."
"There will be fallout from cyberwar that impacts you no matter what walk of life you are," he said.
Stiennon pointed to the tools used in the Stuxnet worm that is now being copies in "broadly distributed toolkits."
For the Defense Department to be prepared for future attacks, the agency will have to assign responsibility "pushed down to every level," Stiennon said.
He added that Congress will have to create an organization that has budgetary control over cybersecurity.
Especially in the age of WikiLeaks, agencies should be proactive by monitoring network behavior and warning employees that they are being monitored.
Stiennon blogs at Threat Chaos.