Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Justice IG Michael Horowitz shares findings about what happens to illegal immigrants before they go to immigration court. Plus, how are postal employees faring on the East Coast after superstorm Sandy?
Thousands of IRS computers could be prone to cyber intruders because officials aren't updating software in a timely manner, according to a report from the Treasury Inspector General for Tax Administration.
Terry Edwards, the director of the Office of the Chief Systems Engineer and chief information officer for the assistant secretary for acquisition, logistics and technology, said his office helps acquire technology and ensure standards are met.
November 1, 2012(Encore presentation December 27, 2012)
EPA's 25,000 email users will be fully migrated to the cloud by early 2013 thanks to collaboration solutions provided by Lockheed Martin and Microsoft.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The 18-month study found DoD is no longer the employer of choice for STEM workers, at a time it should be attracting a "high fraction of the highest-quality STEM workforce."
How would the Pentagon change under Mitt Romney? And what would President Obama do to the Defense Department in a second term? Federal Drives talks to advisers to the two candidates about the different approaches to national security.
The Federal Drive with Tom Temin and Emily Kopp hosts a panel discussion on how industry and the government are working together on meeting their shared cybersecurity goals.
Pentagon makes one more plea for a resolution to sequestration. A regular budget, an annual authorization bill and a resolution to the fight over cybersecurity laws would be helpful as well.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Rep. Jim Langevin (D-R.I.), co-founder of the bipartisan Congressional Cybersecurity Caucus, says the U.S. is falling short when it comes to a skilled cyber workforce capable of operating at the highest levels of its field. His column is part of Federal News Radio's special report, Cybersecurity Rising.
Rep. Mac Thornberry (R-Texas), the chairman of the House GOP Cybersecurity Task Force, argues that the country's national security cannot afford a stalemate on cyber legislation. His column is part of Federal News Radio's special report, Cybersecurity Rising.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
The draft solicitation asks for 15 toolsets and 11 service areas to help agencies implement continuous monitoring as-a-service and to buy sensors. DHS has asked vendors on GSA Schedule 70 to comment on the requirements.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
A draft executive order directs U.S. spy agencies to share the latest intelligence about cyberthreats with the companies operating electric grids, water plants, railroads and other vital industries in order to protect them from electronic attacks.