Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
DorobekInsider: Cyber-attack 2009 – what does it mean?
Wednesday - 7/8/2009, 6:57pm EDT
There has been a big focus today on the cyber-attacks over the past few days. Some news outlets are reporting that the attacks may come from North Korea — something many people are already doubting given that country’s limited technology infrastructure.
I’ve been speaking to a number of people throughout the day about what this means. Many government cyber-security experts suggest that the timing of the attacks — starting on the Fourth of July — is probably not accidental.
The big question, actually, is whether this will spur further action by the Obama administration — for example, like naming of what we have all taken to calling the cyber-czar.
I’ll post additional resources later, but… for right now, if you’re looking for additional information…
* The DorobekInsider reader: Obama cyber policy review… At the end of May, the President announced the results of his 60-day top-to-bottom review of the nation’s cyber-security defenses. I have a number of resources — everything from links to the document itself to a Congressional Research Service Review. Find it all here.
* Cyber-czar candidates… We hear the appointment was to have happened July 13, but could that be stepped up given recent events? GovInfoSecurity.com is hearing the same names that I’m hearing. I hear there are three names under serious consideration:
- Melissa Hathaway, who got high marks for leading the Obama cyber-security review
- Fred Kramer, who served as the assistant defense secretary for international security affairs under President Clinton
- Howard Schmidt, former Microsoft chief security advisor and former adviser to Bush on cyberspace security
* 5 Fed Cybersecurity Priorities for the Summer from GovInfoSecurity.com.. a great read…
Summertime Action: Naming a cyber czar, reforming FISMA, securing the cloud, enhancing R&D and updating the Privacy Act… read more here.