Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.
The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.
Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton.
September 25, 2012
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.
The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.
OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.
Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements.
September 20, 2012
Despite several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government.
The Federal IT Acquisition Reform Act would codify much of the Obama administration's 25-point IT reform plan. The draft bill would go even further in attempting to address long-standing challenges for agency chief information officers.
Cyber criminals might unknowingly provide the impetus to help agencies address a cybersecurity skills gap. OPM also is working with agencies to address other shortfalls in key workforce competencies.
Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.
RSA and Booz Allen Hamilton said they will jointly develop new information security products and offer them as managed services.
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
Military's cyber leaders say job satisfaction has so far trumped salary concerns when it comes to building and retaining a workforce of elite cyber warriors. Building the capacity of that training pipeline is the next challenge.
The goal was to achieve an efficient, effective and accountable government. A key strategy was to change the way the federal employee approached the job. In part three of Federal News Radio's week-long, multimedia special report, The Obama Impact: Evaluating the Last Four Years, we examine the tactics employed to create a more efficient workforce; hiring and SES reform, reducing backlogs in security clearances and retirement claims, building a cyber workforce, telework and the overall support of the civil servant. Four were rated as effective, two as more progress needed, and one as ineffective.
The contract is part of DARPA's High-Assurance Cyber Military Systems.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
In part 2 of Federal News Radio's special report, The Obama Impact: Evaluating the Last Four Years, we examine the success and change brought by five technology initiatives. We rated three as effective, one as having made some progress, but more is needed, and a fifth as ineffective.