Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Charlie Armstrong, the chief information officer at Customs and Border Protection, joins Federal News Radio for a free online chat on October 30, 2014.
NASA Ames CIO Jerry Davis joins Federal News Radio for a free online chat to discuss his IT priorities for NASA Ames, including workforce development, big data analysis and his efforts to improve the center's cybersecurity.
The White House wants the government to lead a nationwide effort to reduce identity theft and fraud. More secure government credit cards and multi-factor authentication for federal websites dealing with sensitive citizen data are two ways to do that.
The Office of Management and Budget is pushing back against the recent critical report on federal cloud computing efforts by 19 civilian agency inspectors general.
Embedding cybersecurity into the Defense Department's design, manufacturing, and supply chain is a goal the Pentagon sees is possible. Mike Papay is Chief Information Security Officer and Vice President at Northrop Grumman, and Frank Cilluffo is director of the George Washington University Cybersecurity Initiative and the Homeland Security Policy Institute. On In Depth with Francis Rose, they offered steps the DoD can take to address the issue.
SAIC's Mary Mayonado and Bill Kaczor join Federal News Radio's Custom Media Director Jason Fornicola for a free online chat to discuss the challenges in managing threats throughout the full cybersecurity life cycle - beyond just compliance requirements. Ask the industry experts live and learn about cyber's big picture, how to use data analytics to protect against insider threats, and what they're hearing from customers.
The Council of Inspectors General analyzed 77 commercial cloud contracts across 19 civilian agencies and found most failed to implement federal guidance and best practices. Auditors found these shortcomings could put data and systems at a greater risk to cyber attack or data theft.
Michael Daniel, the White House cyber coordinator, said the administration believes getting cyber legislation through Congress on small pieces is more likely to be successful than in one comprehensive bill. Legislation to update FISMA, to improve information sharing and to expand the workforce all have garnered bi-partisan support.
In fiscal 2015 FISMA guidance, OMB is trying to close a big hole exposed during the government's reaction to the Heartbleed vulnerability. The White House is giving DHS the authority to regularly conduct proactive scans of certain civilian agency networks. DHS made it clear to Congress earlier this year the delay in getting permission from agencies to scan their networks cost them days in response time during Heartbleed.
Pentagon wants to discourage other countries' cyber attacks by convincing them that that DoD will respond, and that the attacks will ultimately prove unsuccessful. Step one is conveying those messages more forcefully.
The goal of the scorecard or dashboard would be to give government leaders a better sense of just how secure agency networks are from hackers. As the 11th annual National Cybersecurity Awareness Month begins, DHS is doing much less education about why securing computers and networks is important.
The leader of the Army's new Cyber Center of Excellence says his job is not merely to build the cyber workforce, but to integrate that up-and-coming capability with the Army's existing signals and intelligence disciplines.
Cyber operations is about the only area of the DoD budget that hasn't been subject to cuts. But the new leader of the Army's Cyber Center of Excellence says that doesn't mean the Army can grow its newest military discipline in isolation. Federal News Radio DoD reporter Jared Serbu has the details.
The Office of Personnel Management has a list of 25 different conferences that comply with federal training regulations. Dan Waddell is director of government affairs for the cybersecurity non-profit (ISC)2. OPM just added their fourth annual Security Congress event to its list of approved conferences. On In Depth with Francis Rose, Waddell explained how the event got on the list.
Nov. 15 is the deadline for the Centers for Medicare and Medicaid Services to patch up the cybersecurity holes in the Healthcare.gov website. The Government Accountability Office offered 22 technical recommendations to the agency last week. Those problems appear just as the website nears its first birthday. Raj Sharma is co-founder and CEO of the Censeo Consulting Group. On the In Depth with Francis Rose Industry Chatter segment, he shared some ways to predict, and fix, longstanding problems with large federal IT projects like Healthcare.gov.
Report: Government's own 'white-hat' hackers give HealthCare.gov mixed review on security
Allen Harper, vice president and chief hacker for Tangible Security will discuss how his company is helping federal agencies with their cybersecurity challenges.
September 23, 2014
The FBI will channel more people and resources into its Pittsburgh office. It's a reward for the cybersecurity team that's credited for catching five Chinese military leaders stealing trade secrets, and a Russian-based cyber crime ring that stole about $100 million from banks around the world. Michael McKeown is supervisory special agent for the Associate Division Counsel, part of the FBI Cyber Initiative and Resource Fusion Unit based in Pittsburgh. On In Depth with Francis Rose, he explained the cybersecurity effort that earned the extra resources.
Cybersecurity is emerging as a major business risk. USIS, the government's main contractor for security background checks, had a big contract canceled. A security breach exposed personal information about 25,000 Homeland Security employees. It doesn't matter that the company discovered and reported the breach itself. Kiersten Todt and Roger Cressey are former feds and now principals of Liberty Group Ventures. They joined Tom Temin on the Federal Drive to discuss strategies for not becoming the next USIS or Home Depot.