Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Rosemary Wenchel is the new deputy assistant secretary for cybersecurity coordination at DHS. She replaces Adm. Mike Brown, who retired in January.
The Transportation Security Administration already shares intelligence it collects with airports. Now a House bill would expand TSA's intel sharing to local mass transit systems as well.
Lt. Danielle Daniese Ferreira, 36, of Alexandria, Va., pleaded guilty to obtaining thousands of dollars from Coast Guard repair contracts that she oversaw. Her co-defendants channeled money into two accounts owned by Ferreira and her spouse.
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
The Homeland Security Department is taking a two-pronged approach to protecting the federal supply chain. The first addresses the DHS mission cargo crossing into the U.S. The second is an interagency effort to ensure the government is working together on investigations. DHS said seizures of counterfeit goods at the border increased by 20 percent in 2011.
The Homeland Security Department showed lawmakers and staff how easy it is to create a spear phishing attack against a federal employee using free, open-source tools. The agency also said the Einstein 3 program is under development and will rely on vendors to provide intrusion prevention services. Sen. Joe Lieberman (I-Conn.) said he expects the cyber bill to go to the Senate floor for debate no later than July.
Two competing bills disagree over how much Homeland Security should dictate cyber standards to the private sector.
The Homeland Security Department has created a task force to develop future workers. It will consider expanding DHS' involvement in cyber competitions and university programs, enhancing public-private partnerships and working with other agencies.
A congressional report released today outlines $70 billion of unspent federal dollars that could have helped disaster victims, spurred highway construction and fund education programs.
The White House has threatened to veto a House bill providing funding for the Homeland Security Department, taking issue with many of the bill's provisions, including a denial of a civilian pay raise. The committee bill also doesn't include any new funding for the agency's data-center consolidation efforts or construction for its new headquarters.
The program launches initial operating capability today. GSA expects the first set of provisionally approved cloud service providers to be ready in December. In the meantime, agencies are holding vendors accountable for coming very close to FedRAMP standards.
The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.
Jeff Orner, chief administrative officer at the Department of Homeland Security, talks about a teleworking award his office recently received. Sopen Shah, a defense analyst with Bloomberg Government, discusses a new report on federal contracting. Ed Zurndorfer, registered employee benefits consultant, explains what phased retirement could mean for feds. University of Baltimore law professor Richard Loeb discusses the backlog at the Defense Contract Audit Agency.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.
The Customs and Border Protection directorate wants to weed out agents who "go bad" years into their careers, using more lie detector tests. Background checks at the Transportation Security Administration have kept more than 5,000 potentially bad actors from joining the TSA workforce. At Immigration and Customs Enforcement, leaders emphasize the importance of employee outreach and education to prevent corruption.
From the vantage point of the Comfort Inn parking lot near the entrance to Kodiak's airport, traffic moves north toward downtown or south to the Coast Guard air station, the home to cutters, helicopters and rescue swimmers that aid mariners in the Bering Sea or the Pacific Ocean.
The lawmaker leading an inquiry into the Secret Service prostitution scandal reported dozens of "troubling" episodes of past misbehavior Wednesday and appealed to insiders to come forward with what they know as investigators try to determine whether a culture of misconduct took root in the storied agency.