Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
Your agency's chief information security officer has a problem that might not have a solution. The online ecosystem of apps and mobile devices is creating a perfect storm of incoming threats and financial challenges. Hord Tipton, executive director of the information security non-profit (ISC)², is the former chief information officer of the Interior Department.
DoD's Health Management Systems Modernization Program seeks input from vendors on the current capabilities of electronic health records in the commercial market. The Defense Intelligence Agency issued a draft request for proposals in late September for the multiple-award Enhanced Solutions for the Information Technology Enterprise (E-SITE) contract, which could be worth $6 billion.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
Sanjay Castelino, vice president at SolarWinds, will discuss how your agency can benefit from a concept call Virtual Desktop Infrastructure.
October 8, 2013
Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.
Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.
Inside the Reporter's Notebook: OMB adds clarity to new cyber policy; Cyber risks during shutdown overstated; OASIS delayed inde
The White House is finalizing its first major cybersecurity policy in more than three years.
The "persistent threat" is becoming the hallmark of how government and industry deal with cybersecurity concerns, particularly threats to the nation's electrical grid and critical infrastructure. Plus: how is industry and government training and retaining top cybersecurity professionals? On this edition of "AFCEA Answers", we'll explore these topics with Dr. Ernest McDuffie from NIST; Mike Peterson, Vice President with URS, former Air Force CIO; and Tom Conway, Director of Federal Business Development with McAfee.
Anne Neuberger, director of the National Security Agency's Commercial Solutions Center, explains the pluses and minuses of public-private partnerships for the cybersecurity world.
Ed Dorris, the CIO of the Comptroller of the Currency, said he evaluates IT policies, tools and procedures to ensure employees have a "hassle-free" IT environment.
October 3, 2013
Even though government agencies are in shutdown mode, contractors are still moving ahead in making business decisions. Small businesses are likely to hurt more from the shutdown due to smaller cash reserves and slimmer margins.
More than two years after the planning effort began, DoD's push to converge thousands of disparate IT enclaves into a more coherent structure is beginning to bear fruit.
Lt. Gen. Susan Lawrence announced today is her last day in uniform after 41 years in the Army. She leaves a legacy as the Army CIO who oversaw a huge amount of change over the last two years.
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Some government agency websites were essentially turned off Tuesday morning, as the shutdown officially got underway. Agencies also began sending out messages via social media alerting followers that accounts would not be updated during the shutdown.
OMB and GSA put out separate memos detailing steps agencies should take if the government shuts down. OMB reminded agencies to secure systems and how to deal with third-party social media sites. GSA gave agencies ideas to minimize the impact of having to shutdown websites.
The Homeland Security Department chose 15 large businesses to provide technology development, implementation and maintenance services under the EAGLE II multiple award contract.
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.