Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
George McCubbin, head of AFGE's National Border
Patrol Council, shares what it's like on the job
of a border patrol agent.
August 8, 2012(Encore presentation August 22, 2012)
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
The historic labor agreement covering 45,000 transportation security officers (TSOs) overhauls the current pay-for-performance system, puts in place a grievance process for workplace disputes and increases the uniform allowance.
Homeland security has improved, but the reforms mean DHS reports to 108 oversight committees and subcommittees, leading to wasted hours at hearing after hearing.
The Department of Homeland Security's inspector general partnered with both Customs and Border Protection and Immigration and Customs Enforcement personnel to investigate an increasing number of cases. Leaders of all three reported to a House subcommittee hearing that the collaboration has benefited the investigation process.
Mary Ellen Callahan plans to move back to the private sector to practice law after three years of service to the federal government. Callahan made rigorous privacy safeguards the norm during her time at DHS.
DHS prevents homelessness wherever possible and provides short-term emergency shelter and re-housing support when needed.
Last year, FEMA ranked 231 out of 241 agencies in the Best Places to Work rankings, compiled by the Partnership for Public Service. This year the agency took a deep-dive look at the Employee Viewpoint Survey data to help explain why workers are so unhappy.
After last week's shooting at a movie theater in Aurora, Colo., the city of Houston has produced a how-to video on surviving a shooter event.
The National Protection and Programs Directorate said it would not put a contractor communication guidance in place that would have required agency leaders to answer 15 questions before meeting with companies. Industry experts said the draft guidance would have had a chilling effect on agency-contractor communication.
The Modified Infrastructure Survey Tool does not provide information about the consequences of security incidents at federal facilities, a GAO auditor said. As a result, agencies cannot effectively deploy countermeasures. Still, Rep. Dan Lungren (R-Calif.) said he was happy with FPS' progress in developing MIST.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.
Victims need to speak up and report cyber attacks. That's the message from the Bipartisan Policy Center and top security officials, who say only a fraction of attacks are reported each year.
The revised Cybersecurity Act of 2012 removes DHS from having sole oversight authority of critical infrastructure and shares the responsibility across an interagency council. The bill also would make the implementation of cyber standards by critical infrastructure operators voluntary. The legislation encourages an incentive-based program.
The service is taking a four-pronged approach to improve its procurement process and find savings. A review board looks at all acquisitions to make sure its strategy and contract formation are beneficial. Other agencies, like NASA and DHS, are consolidating more contracts into larger buys.
A federal agency supports a plan to sell New York's Plum Island, home to the country's only laboratory that studies infectious animal diseases that could affect the livestock industry, according to a draft report by the agency.
Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.
The federal government has issued more than 4.8 million security clearances to federal civilians, military service members and contractors. But the process for determining what positions require clearances amounts to little more than a "hodge-podge" across agencies, an official with the Government Accountability Office told Federal News Radio.
Homeland Security Secretary Janet Napolitano met with governors this weekend to highlight the role states can play in responding to cyber incidents. She spoke at the National Governors Association meeting in Williamsburg, Va.
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.