Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton.
September 25, 2012
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.
The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.
OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.
Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements.
September 20, 2012
Despite several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government.
The Federal IT Acquisition Reform Act would codify much of the Obama administration's 25-point IT reform plan. The draft bill would go even further in attempting to address long-standing challenges for agency chief information officers.
Cyber criminals might unknowingly provide the impetus to help agencies address a cybersecurity skills gap. OPM also is working with agencies to address other shortfalls in key workforce competencies.
Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.
RSA and Booz Allen Hamilton said they will jointly develop new information security products and offer them as managed services.
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
Military's cyber leaders say job satisfaction has so far trumped salary concerns when it comes to building and retaining a workforce of elite cyber warriors. Building the capacity of that training pipeline is the next challenge.
The goal was to achieve an efficient, effective and accountable government. A key strategy was to change the way the federal employee approached the job. In part three of Federal News Radio's week-long, multimedia special report, The Obama Impact: Evaluating the Last Four Years, we examine the tactics employed to create a more efficient workforce; hiring and SES reform, reducing backlogs in security clearances and retirement claims, building a cyber workforce, telework and the overall support of the civil servant. Four were rated as effective, two as more progress needed, and one as ineffective.
The contract is part of DARPA's High-Assurance Cyber Military Systems.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
In part 2 of Federal News Radio's special report, The Obama Impact: Evaluating the Last Four Years, we examine the success and change brought by five technology initiatives. We rated three as effective, one as having made some progress, but more is needed, and a fifth as ineffective.
The Android vulnerabilities caused by slow patches are well-known and may be a concern for federal agencies who are considering the Bring Your Own Device model.
BAE said it also planned to circle the wagons around its cybersecurity arm handling sensitive government information.
The Select Committee on Intelligence member wrote a letter to White House Cyber Coordinator Michael Daniel asking him to make sure any mandate doesn't harm the networks used for interactive computer services.