Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Randy Humphries, NASA Glenn Research Center's chief information officer, uses his background in project management to improve how technology is delivered to mission areas.
This AFCEA Answers episode investigates current trends in cloud computing in government and industry. Hear what US Navy CIO Terry Halverson has to say about cloud computing in the US Navy.
All agencies are fighting cyber-attacks. The FBI Director of Cyber Security believes there are two groups of organizations: those whose systems have been attacked and those who do not know they have been attacked. In the federal space, the velocity and variety of attacks has dramatically increased. With Advanced Persistent Threats (APT), the time it can take to comprise a system ranges from hours to days, yet the time it takes for its discovery averages 6 months. The cyber security solution has shifted from the perimeter (firewall) or how to stop the attacks to how to deal with the attacks after they occur. The emphasis is now on the controls and minimizing what the attacker is doing once he gets in. The cost of the attacks is down time and data loss. With a 200% to 300% increase in attacks on agency's systems, it is imperative the federal government implements a holistic solution including hardware, software, training and compliance.
Without commenting on the reasons behind the protest, a team led by Computer Sciences Corporation challenged the Navy's decision to award a multibillion dollar contract to operate IT networks to a competing team headed up by HP.
Earlier this year information security firm Mandiant identified a previously unknown group hackers thought to be in China. "People referred to China or Chinese hackers, but there was plenty of wiggle room there to assume it could be a collection of guys working in someone's basement without a tie to the government," Richard Behtlich chief security officer for Mandiant. The group the identified is called Unit 61398. Bejtlich says, "we showed pretty conclusively that at least this one group is part of the PLA" AKA The Chinese People's Liberation Army.
Inside the Reporter's Notebook: DHS cyber contract awards delayed; musical chairs in federal IT ranks
News and buzz in the acquisition and IT communities that you may have missed this week.
As the cybersecurity workforce gets older and closer to retirement age, the Office of Personnel Management is trying to help agencies find new talent. It's creating a new database of cyber positions that it hopes will help agencies identify the cyber skill sets needed to meet their missions. The Obama administration has made reducing critical cyber workforce gaps one of its top "cross-agency" goals.
House Armed Services and Veterans Affairs committees inserted a provision in the fiscal 2014 Defense Authorization Bill requiring DoD and VA to have an interoperable health record system by 2017. Agency officials say they already are and will continue to share health care data, but having one integrated, interoperable health care management system is no longer necessary.
John Thompson made his case to be the next head of the Census before the Senate Homeland Security and Governmental Affairs Committee Tuesday. He said technology is the key to cutting costs and improving the count's accuracy.
The Department of Health and Human Services will release a solicitation for email-as-a-service this summer.
July 11, 2013
Law enforcement and first responders have been put on notice --their mobile phones are targets for hackers. They've been informed in roll call bulletins that hackers, by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.
Alex Grohmann and John Dyson from the Northern Virginia Chapter of the Informations Systems Security Association, join host John Gilroy to talk about what you can do to make your agency more secure.
July 9, 2013
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.
The Commerce Department's Economic Development Administration spent almost $3 million to remediate a cyber attack that really didn't happen. Commerce's inspector general found the attack infected only two outgoing email servers and not more than half of EDA's systems. Two cybersecurity experts say other agencies can learn from EDA's year-long unnecessary and expensive recovery.
Chase Garwood, the SBA acting CIO, said the agency is working with DHS and Justice to improve the security of its internal and external customer-facing systems.
July 4, 2013
A recent report from the Office of Inspector General found a State Department bureau paid $630,000 to boost its number of Facebook friends.
The Defense Information Systems Agency is targeting the third or fourth quarter of 2014 for full operational capability of its cloud broker service. DoD components will use automated tools to choose cloud computing services from DoD, other agencies or private providers.
Aquilent's Mark Pietrasanta and Sean Fitzpatrick, join host John Gilroy to discuss what federal agencies can do to make their websites more user friendly.
July 2, 2013
The State Department is enlisting digital- and media-savvy college students to complete short- and long-term diplomacy tasks remotely.
This AFCEA Answers episode explores the cyber threat landscape and how it impacts government and industry.