Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
umberto Navarrete told The Associated Press that he testified for about 90 minutes at a San Diego courthouse and told the grand jury he thought the border officials' actions were excessive.
The Veterans Affairs Department said it saved $40 million by using this centralized approach to managing contractors. vendor management organizations also help agencies buy more strategically. OFPP plans to expand strategic sourcing and sets a $2 billion savings goal by 2015.
How is the government using big data currently?
The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.
Mark Weatherford became undersecretary for cybersecurity last fall. Since then, he has hired eight senior officials to fill high-profile positions.
In an executive order issued Friday, President Barack Obama laid out an all-hands-on-deck approach to developing policies for preserving government communications in the event of a national disaster or emergency. The order creates the Executive Committee on National Security and Emergency Preparedness Communications — or NS/EP communications — to be staffed with high-ranking officials from eight agencies and departments
In 2011, companies reported 198 cyber incidents to the Homeland Security Department — a nearly 383 percent increase above 2010, according to a June 28 report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Companies reported nine such incidents in 2009., when DHS opened ICE-CERT to help protect private-sector operators critical infrastructure from "emerging" cyber threats.
The director of the Federal Network Security Branch becomes the fifth senior-level official to leave in more than a year. Danny Toler will assume his responsibilities at least in the interim.
Program to provide identification cards for maritime workers lags behind a similar DoD effort, and is causing decade-long problems.
The department responsible for keeping the government safe from cyber threats could use some help of its own when it comes to securing mobile devices.
Homeland Security releases policy and guidance on how departments and vendors will implement continuous monitoring and get away from static reports on the cyber health of their systems. DHS is hoping Congress approves a $200 million funding request to buy five different commercial cyber tools, a dashboard and a security data warehouse in 2013.
The pressing need for cybersecurity legislation has led to widely divergent paths in the House and Senate. The House has opted for a more incremental approach, while the Senate has crafted comprehensive legislation
Homeland Security is getting serious about making sure all federal agencies get on board with continuous network monitoring. Keeping a vigilant eye out is the best way to fend off cyber attacks, DHS officials say.
Rosemary Wenchel is the new deputy assistant secretary for cybersecurity coordination at DHS. She replaces Adm. Mike Brown, who retired in January.
The Transportation Security Administration already shares intelligence it collects with airports. Now a House bill would expand TSA's intel sharing to local mass transit systems as well.
Lt. Danielle Daniese Ferreira, 36, of Alexandria, Va., pleaded guilty to obtaining thousands of dollars from Coast Guard repair contracts that she oversaw. Her co-defendants channeled money into two accounts owned by Ferreira and her spouse.
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
The Homeland Security Department is taking a two-pronged approach to protecting the federal supply chain. The first addresses the DHS mission cargo crossing into the U.S. The second is an interagency effort to ensure the government is working together on investigations. DHS said seizures of counterfeit goods at the border increased by 20 percent in 2011.
The Homeland Security Department showed lawmakers and staff how easy it is to create a spear phishing attack against a federal employee using free, open-source tools. The agency also said the Einstein 3 program is under development and will rely on vendors to provide intrusion prevention services. Sen. Joe Lieberman (I-Conn.) said he expects the cyber bill to go to the Senate floor for debate no later than July.