Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The news websites, FederalNewsRadio.com and WTOP.com, are accessible to all Internet users following resolution of a cyber attack against the websites. Users accessing the websites from all web browsers, including Internet Explorer, have full access to both websites.
Seven people were arrested in the U.S., accused of operating the New York cell of what prosecutors said was a network that carried out thefts at ATMs in 27 countries from Canada to Russia.
Out of an abundance of caution, Federal News Radio is continuing to block access to FederalNewsRadio.com via the Internet Explorer browser.
Three Department of Homeland Security components are testing how ongoing authorizations work. The Office of Management and Budget is drafting a memo to require agencies to change from approving the cybersecurity of systems every three years to a more regular oversight schedule.
On the one-year anniversary of the Digital Government Strategy, the CIO Council and DHS are expected to issue a security baseline and reference architecture for mobile computing. The goal of the document is not to give agencies new requirements but to focus on those security standards that are mobile-centric.
The Pentagon's mobile plan includes device approvals that will involve some up-front costs. The expectation is those costs will be quickly offset by eliminating the inefficiency of the slow, stovepiped and outdated approaches that have characterized DoD mobility up until now.
On this week's Capital Impact show, Bloomberg Government analysts will examine the reasons for the shortage of skilled worker visas, and the differences between U.S. and European approaches to cybersecurity.
May 2, 2013
Chase Garwood, the SBA acting CIO, said the agency is working with DHS and Justice to improve the security of its internal and external customer-facing systems.
May 1, 2013
The Defense Advanced Research Projects Agency has been at the forefront of some of the most innovative technologies ever created — including the Internet. But as budgets tighten, the agency's director says she's trying to figure out how to deal with an increasingly complex threat environment as less money flows into the research and development pipeline.
Inside the Reporter's Notebook: Communication breakdown over FITARA? Lawmaker wants answers from DHS
News and buzz in the acquisition and IT communities that you may have missed this week.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Pro-business cybersecurity bill sails through House again, but without clear path ahead
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.
House panel approves pro-business cybersecurity bill over protests by civil liberties groups
The House Intelligence Committee is trying to revive legislation that would let industry and the federal government swap information on the latest cyber threats.
The federal cyber workforce is not facing an immediate retirement wave, but it will if agencies don't increase the number of younger workers.
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
An independent group's report offers ways for agencies to evolve to continuous monitoring and risk-based approaches to cybersecurity within the existing Federal Information Security Management Act, and proposes more cooperation between CIOs and agency inspectors general.
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Officials aim to redefine operational series codes for civilian cybersecurity workers and offer more pay for additional expertise. The Air Force would like to create an elite cadre of civilian cyber warriors.