Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The service is taking a four-pronged approach to improve its procurement process and find savings. A review board looks at all acquisitions to make sure its strategy and contract formation are beneficial. Other agencies, like NASA and DHS, are consolidating more contracts into larger buys.
A federal agency supports a plan to sell New York's Plum Island, home to the country's only laboratory that studies infectious animal diseases that could affect the livestock industry, according to a draft report by the agency.
Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.
The federal government has issued more than 4.8 million security clearances to federal civilians, military service members and contractors. But the process for determining what positions require clearances amounts to little more than a "hodge-podge" across agencies, an official with the Government Accountability Office told Federal News Radio.
Homeland Security Secretary Janet Napolitano met with governors this weekend to highlight the role states can play in responding to cyber incidents. She spoke at the National Governors Association meeting in Williamsburg, Va.
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Longstanding problems with integration put DHS' mission to protect the country at risk, former leaders and lawmakers said. Nine years after it was created, the department still struggles to make its many components and agencies work as one.
A government-backed committee of the National Research Council issued a report Friday saying the United States would have adequate biosecurity protections even if plans for a proposed $1.14 billion lab in Kansas are scaled back.
The Government Accountability Office assessed the performance of seven federal agencies in migrating some of their services to the cloud as required by the Office of Management and Budget. Five of the seven agencies succeeded in meeting OMB's requirements and the other two are expected to be compliant by year's end.
Budget pressures and a change in mission leads to cuts in U.S. Customs and Border Protection. Border stations in California, Montana, Idaho and Texas face closures that will affect 48 border patrol members.
umberto Navarrete told The Associated Press that he testified for about 90 minutes at a San Diego courthouse and told the grand jury he thought the border officials' actions were excessive.
The Veterans Affairs Department said it saved $40 million by using this centralized approach to managing contractors. vendor management organizations also help agencies buy more strategically. OFPP plans to expand strategic sourcing and sets a $2 billion savings goal by 2015.
How is the government using big data currently?
The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.
Mark Weatherford became undersecretary for cybersecurity last fall. Since then, he has hired eight senior officials to fill high-profile positions.
In an executive order issued Friday, President Barack Obama laid out an all-hands-on-deck approach to developing policies for preserving government communications in the event of a national disaster or emergency. The order creates the Executive Committee on National Security and Emergency Preparedness Communications — or NS/EP communications — to be staffed with high-ranking officials from eight agencies and departments
In 2011, companies reported 198 cyber incidents to the Homeland Security Department — a nearly 383 percent increase above 2010, according to a June 28 report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Companies reported nine such incidents in 2009., when DHS opened ICE-CERT to help protect private-sector operators critical infrastructure from "emerging" cyber threats.
The director of the Federal Network Security Branch becomes the fifth senior-level official to leave in more than a year. Danny Toler will assume his responsibilities at least in the interim.
Program to provide identification cards for maritime workers lags behind a similar DoD effort, and is causing decade-long problems.
The department responsible for keeping the government safe from cyber threats could use some help of its own when it comes to securing mobile devices.