Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.
When it comes to securing the nation's cybersecurity infrastructure, how do federal officials think of the future? One of the top cybersecurity officials at the Department of Homeland Security weighed in on the topic at the ISC2 SecureAmericas conference yesterday.
The agency plans to deploy a high-speed network, new Office-based PCs, and other infrastructure improvements.
Hoping to make the third nomination the charm, the White House has tapped FBI Deputy Director John Pistole to head the Transportation Security Administration. Former nominee Erroll Southers tells us what's at stake.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
Learn more in today's cybersecurity update.
Membership in a terrorist organization does not prohibit a person from possessing firearms or explosives under current federal law. Eileen Larence, director of Homeland Security and Justice Issues at the GAO, explains.
Richard Haley II
Assistant Director and Chief Financial Officer, FBI's Financial Division
A new Washington FBI field-office unit has agents working exclusively on Foreign Corrupt Practices Act and may be able to pay for itself. Details from Shawn Henry, Assistant Director in Charge of the Washington Field Division
CACI International VP believes agencies are making progress on security
Multiple hearings focus on figuring out what led to the Dec. 25 attempted terrorist attack. FBI, DHS, State offer details on what changes each made in the last month.
New push to improve legal protection for federal whistleblowers
Living with a backlash