Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
The House Science, Space and Technology Committee approved two cybersecurity bills this week. Both bills were approved by the House last term, but never came up for a vote in the Senate. That chamber is considering a comprehensive approach to cyber legislation.
Mark Weatherford, the National Protection and Programs Directorate (NPPD) deputy undersecretary for cybersecurity, will leave the agency on April 12 after accepting a job in the private sector.
U.S. Cyber Command is putting together dozens of groups to defend the military's network, to work with combatant commanders on offensive tactics and to respond to attacks against the nation. Gen. Keith Alexander, however, said budget cuts will delay DoD's ability to recruit and train team members.
Federal agencies reported more than 48,000 cyber attacks in 2012 and continue to struggle to defend their networks, according to a new report from the Government Accountability Office. Senators are now renewing their push for comprehensive cyber legislation, which would include an update to FISMA.
Watchdog says VA sent sensitive patient data over unencrypted networks, posing security risk
FedRAMP and other initiatives are helping CIOs become more comfortable with securing data and applications in the cloud. But changing the way agencies buy, manage and oversee technology is a bigger roadblock in moving systems to the cloud.
The Pentagon's commercial device implementation plan, made public Tuesday, aims at near-term implementation of a new generation of mobile devices such as iPhones, iPads and Android handhelds and tablets on both classified and unclassified networks.
Sen. Chuck Grassley (R-Iowa) is concerned new regulations may make whistleblowers even more reluctant to report tax fraud to the IRS. OMB Controller Danny Werfel says $85 billion in cuts under sequestration would hurt every state. Maj. Gen. Brett Williams says the U.S. Cyber Command is trying to figure how to normalize operations alongside air, land and sea capabilities. Lynn Singleton, director of environmental services at Lockheed Martin, talks about helping agencies move their email to the cloud. Dr. Milton Corn explains why The National Library of Medicine is monitoring social media.
President Obama's recent executive order directing that cyber threat information be shared more broadly with the private sector risks making the data less useful to the intelligence agencies that gather and process it. But the risk is worth the potential reward.
Federal Drive Host Tom Temin broadcasted live from the AFCEA DC cybersecurity conference on Friday. He spoke with AFCEA DC President Brian Roach. Also this week the Pentagon has detailed its plans to furlough 800,000 employees unless Congress stops budget cuts. Registered Employee Benefits Consultant Ed Zurndorfer joins us with some tips on navigating sequestration.
China hacking reveals outsourcing to private US firms in international cyberwar
New US effort launched to stem theft of trade secrets; concern about China leads to action
On this week's Bloomberg Government Capital Impact show, analysts will discuss the impact of the cybersecurity executive order signed by President Obama.
February 21, 2013
Retired Air Force Gen. Chuck Walks talks about what the next Secretary of Defense's first hurdles will be. Bernie Becker, staff writer at The Hill newspaper, discusses a possible Simpson-Bowles sequel.
GAO's Mark Gaffigan talks about how the federal government will experience increased fiscal exposure due to climate change. Gary Somerset discusses the GPO's new Pinterest page. On Legal Loop, procurement attorney Joe Petrillo discusses a change in status for the Alaska Native Corporations. John Plaguta of the Partnership for Public Service discusses the critical skills gaps in the federal workplace. Former SEC Chairman Harvey Pitt talks about rule writing in the wake of the Dodd-Frank Wall Street Reform and Consumer Protection Act.
Gordon Heddel of Booz Allen Hamilton talks about the challenges of creating a smarter but not bigger government. Aaron Miller of the Wilson Center discusses the hurdles awaiting new Secretary of State John Kerry. Bloomberg Government's Rob Barnett talks about President Obama's environmental policy. John Mahoney of Tully Rinckey says furloughed feds won't lose their rights.
On this week's Bloomberg Government Capital Impact show, analysts examine how the gun control debate will affect the demand for mental health services, and how contractors will be impacted by the President's new cybersecurity executive order.
February 14, 2013
Despite a veto threat a year ago, House proponents of a cyber information sharing bill say productive talks now are underway with the Obama administration. Reps. Mike Rogers and Dutch Ruppersberger re-introduced the Cyber Intelligence Sharing and Protection Act (CISPA) trying to address privacy and civil liberties concerns.
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Administration officials and lawmakers say America is losing an aggressive cyber-espionage campaign waged from China.Both sides agreed to push legislation that would make it easier for the government and industry to share information about who is getting hacked and what to do about it.