Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
American companies should avoid doing business with China's two leading technology firms because they pose a national security threat to the United States, the House Intelligence Committee is warning in a report to be issued Monday.
The Homeland Security Advisory Council Task Force on Cyberskills submitted 11 recommendations to the DHS secretary on how to improve the agency's cyber workforce. The committee said DHS must define the skills needed to protect .gov networks. It also suggested setting testing and certification standards.
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
The annual reporting memo gives agencies 57 questions and answers as they prepare their 2012 cybersecurity report.
Cybersecurity affects every agency, program and employee, and has become an even greater challenge to manage as global networks become more susceptible to risk. Learn how agency CIO's can develop cyber strategies and support the desired goals to recruit, retain, and develop the cyber workforce amidst the growing talent gap. General Harry Raduege, Chairman, The Deloitte Center for Cyber Innovation, Deloitte Services LP and Michael Gelles, Director, Deloitte Consulting LLP weigh in on this timely discussion for cybersecurity month.
Casey Coleman, CIO at the GSA, gives a preview of the 2012 Executive Leadership Conference. Lynn Bernabei, a partner with Bernabei and Watchel, discusses the House's sweeping update to the law protecting federal whistleblowers. Tom Fox of the Partnership for Public Service tells how managers can keep their workforce motivated in tough times. Miriam Nisbet of the National Archives discusses a new website aimed at speeding up the FOIA request process.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.
The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.
Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton.
September 25, 2012
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.
The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.
OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.
Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements.
September 20, 2012
Despite several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government.
The Federal IT Acquisition Reform Act would codify much of the Obama administration's 25-point IT reform plan. The draft bill would go even further in attempting to address long-standing challenges for agency chief information officers.
Cyber criminals might unknowingly provide the impetus to help agencies address a cybersecurity skills gap. OPM also is working with agencies to address other shortfalls in key workforce competencies.
Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.