Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
In part two of our examination of cloud computing in the federal government, Dave McClure with the General Services Administration, and Edwin Elmore and Mark Lambdin with Cisco Systems in Washington, provide a report card on cloud computing. How are industry and government meeting the challenges of security, acquisitions and 'big data' when it comes to the cloud? And what do government and industry expect from each other when it comes to the business of cloud computing?
The council issued a new Privacy Best Practices for Social Media guide highlighting issues agencies should consider when using these interactive tools.
Federal CIO Steve VanRoekel offered the administration's first public comment since the major IT reform bill passed the House as part of the 2014 Defense Authorization bill. Rep. Gerry Connolly (D-Va.) offered a blunt warning to the White House if it does not support the legislation.
Federal CIO Steve VanRoekel is testifying this morning before the House Oversight and Government Reform subcommittee on the progress of several IT reform initiatives. He says agencies are on track to close or consolidate more than 850 data centers in 2013.
A recent IG report said the State Department's Bureau of Information Resource Management's Office of Information Assurance lacks organization and lags in performance. The report made 32 recommendations for the office.
Kevin Gallagher, the associate director for core science systems at USGS, said the agency is developing a new data management strategy that will help it meet the White House requirement to make federally-funded research data more easily accessible.
Hundreds of convicts, including senior members of al Qaeda, broke out of Iraq's Abu Ghraib jail after comrades launched a military-style assault, authorities said on Monday. Reuters reports ten policemen and four militants were killed in the clashes. Suicide bombers reportedly drove cars packed with explosives to the gates of the prison on the outskirts of Baghdad on Sunday night and blasted their way into the compound, while gunmen attacked guards with mortars and rocket-propelled grenades.
Tony Celeste, director of Federal Sales at Brocade, will discuss best practices for designing a data center, and making it flexible enough to meet your agency's needs.
July 23, 2013
The Homeland Security Department's Border Management Systems Programs Office awarded a contract to Unisys to modernize its border-management systems.
Brendan Goode, the director of network security deployment in the National Protection and Programs Directorate in DHS, said 15 out of the initial 23 agencies expected to implement Einstein 3 have signed memorandums of agreements with the department. E3A will use both unclassified and classified indicators to understand risks and vulnerabilities of federal networks.
Cyber-attacks on banks are growing more frequent. Wall Street has just conducted a cyber-defense exercise called "Quantum Dawn 2,". During the drill, bank employees were stationed at their normal offices, and were emailed throughout the day with bits of information that could indicate an encroaching hacker attack. They monitored a simulated stock exchange for irregular trading and were pressed to figure out what was going on and how to react while sharing information with regulators and each other.
Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.
Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.
We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.
Researchers at the Forest Products Laboratory worked with Major League Baseball to investigate what causes bats to break.
While leaders at CMS said the hub connecting personal information stored in the health insurance marketplace to multiple agencies will be ready by the Oct. 1 deadline, legislators are concerned with how well CMS is securing individuals' personal information from cyber threats.
Dan Doney, the new chief innovation officer at the Defense Intelligence Agency, talks about the agency's plan to change the way it interacts with industry and brings innovation to government.
A preview of the new Data.gov shows changes in displaying data sets to include outside sources. The new site will have additional style changes and a stronger search engine.
Watervliet Arsenal is celebrating its 200th anniversary as the premier manufacturer of cannons and mortars for the military. Federal News Radio Anchor Tom Temin visited the arsenal for an up-close look at what goes on behind the scenes.