Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Jim Williams and Rick Holgate from ACT-IAC will fill us in on next month's 2013 Executive Leadership Conference in Williamsburg Virginia.
September 17, 2013
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency.
September 10, 2013
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.
The Department of Energy first reported in August 14,000 current and former employees had their Personally Identifiable Information stolen. The department now says that number is nearly four times what it had originally thought.
Marines' recruiting website redirected to pro-Assad message
In her farewall remarks Tuesday, DHS Secretary Janet Napolitano said security improvements have made the U.S. safer. She will leave her position Sept. 6.
The Defense chief information officer is expected to update one directive to expand the number and type of devices that must meet the military's cybersecurity requirements. The Pentagon also will issue a second revised directive to move DoD closer to civilian agencies around risk management of IT systems.
Eight cutting-edge technologies developed by the government are being shown off this week to venture capitalists and investors in Silicon Valley, with the hope of attracting someone to take the applications to market.
Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.
The Energy Department confirmed 14,000 current and former employees are at risk of identity theft as cyber attackers gained access to their personal information. This is at least the second hacking incident this year.
Army Private Bradley Manning apologizes for giving classified documents to WikiLeaks. His sentencing hearing is raising questions about Army commanders' ability to spot mental health issues.
The director of the Defense Information Systems Agency says the agency will spend the next year focusing on a faster, more agile acquisition process to accelerate the way it delivers technology, rather than letting procurements drag on for years.
Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.
How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.
How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.
What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.
Cyber criminals --what's their M.O.? USCERT says Attackers focus on exploiting client-side systems (your computer) through various vulnerabilities. They use these vulnerabilities to take control of your computer, steal your information, destroy your files, and use your computer to attack other computers. A low-cost way attackers do this is by exploiting vulnerabilities in web browsers. An attacker can create a malicious web page that will install Trojan software or spyware that will steal your information.