Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
The FBI wants to rely more on its own information technology staff members rather than outside contractors.
The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity.
Cyber 'capture the flag' contest will premiere at DefCon
Author Shane Harris brings us analysis.
The FBI has again paused work on the deployment of a multi-million dollar case-management system called Sentinel. Washingtonian.com is reporting that the bureau has extended a partial stop-work order that was first issued in March.
The FBI has (again) put the brakes on a multi-million dollar plan to fix its creaky computer systems.
July 19th and 21st
Hear from FEMA Administrator Craig Fugate, Federal Environment Executive Michelle Moore, Dr. David Blumenthal on Health IT, Rich Haley on managing financial resources at the FBI, Professor Tom Davenport on analytics and making better decisions, and Alec Ross on using social media to advance U.S. diplomatic goals. All of this and more next week on The Business of Government Magazine show
Michael Arnold does his cool federal job from a bicycle. That's because he's an officer with the FBI Police Mountain Bike Patrol Team, which he says gives him a special opportunity to interact with the public.
Learn more from Homeland Security Today editor David Silverberg.
The Federal Bureau of Investigation identified 14 suspected "leakers" of classified U.S. intelligence information.
The FBI's new cyber-intelligence still needs a home.
We get analysis from David Silverberg, editor for Homeland Security Today.
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.
When it comes to securing the nation's cybersecurity infrastructure, how do federal officials think of the future? One of the top cybersecurity officials at the Department of Homeland Security weighed in on the topic at the ISC2 SecureAmericas conference yesterday.
The agency plans to deploy a high-speed network, new Office-based PCs, and other infrastructure improvements.
Hoping to make the third nomination the charm, the White House has tapped FBI Deputy Director John Pistole to head the Transportation Security Administration. Former nominee Erroll Southers tells us what's at stake.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
Learn more in today's cybersecurity update.
Membership in a terrorist organization does not prohibit a person from possessing firearms or explosives under current federal law. Eileen Larence, director of Homeland Security and Justice Issues at the GAO, explains.