8:57 am, May 20, 2013
Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Is cyber war a reality . . . or impossible?
Friday - 4/16/2010, 2:27pm EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Jane Norris (6-10 a.m.) and The Daily Debrief with Chris Dorobek and Amy Morris (3-7 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.
- Howard Schmidt is the White House cyber coordinator and recently questioned whether a cyber war could, or would, ever exist. This is a different view than what Army Lieutenant General Keith Alexander expressed to the Senate Armed Services Committee Thursday. Alexander is the director of the National Security Agency and the nominee to lead the Defense Department's Cyber command. He says a cyber war is possible as a part of a larger military action. Federal News Radio's Jason Miller reports.
- And, what do you think of your agency's security? It might depend on whether you're in IT, or in management. The Ponemon Institute surveyed hundreds of IT security professionals throughout the federal government. They found that the rank and file seems more concerned about cybersecurity than upper-level managers. The biggest gaps were found in organizations that require high levels of cybersecurity -- like Homeland Security and Defense. Phillip Kenney is the Director of Information Assurance, Identity and Access Management Solutions for the Ponemon Institute. He says the study also found gaps in cybersecurity training.