Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
The deal will help Northrup broaden its client portfolio amid dwindling defense sales and concerns about sequestration.
The cover up, as they say, is almost always worse than the crime itself. The rule of thumb, from the Watergate era, is follow the money, although people rarely do that. Following the money can be tricky. Also complicated. Especially in the computer age with multi- national players, Senior Correspondent Mike Causey says.
The new bill from Senators Sheldon Whitehouse (D-R.I.) and Jon Kyl (R-Ariz.) change the Department of Homeland Security's control over cybersecurity standards in the private sector.
Debora Plunkett, the director of the National Security Agency's Information Assurance Directorate, said there is good news and bad news when it comes to protecting the U.S. from cyber threats on a daily basis. In an exclusive interview for Federal News Radio's Agency of the Month program, Plunkett said getting the nation's networks to a higher level of security is multifold.
The Defense Department is taking submissions for its 12th annual Cyber Crime Conference. The conference is sponsored by DoD's Defense Cyber Crime Center (DC3). Planners expect more than 200 speakers and 20 different track sessions. Participants from agencies, universities and industry are invited to share ways to prevent cyber crime. Submissions for research abstracts are due by July 6th.
Cybersecurity researchers said Monday that they'd found a link between the infrastructure-wrecking cyberweapon known as Stuxnet and the recently- discovered Flame virus — possibly offering a new clue about the latter's origins.
Two competing bills disagree over how much Homeland Security should dictate cyber standards to the private sector.
A story that moved June 7, 2012, about members of Congress discussing leaks of classified information misstated what Rep. Mike Rogers, R-Mich., said. Rogers said that parts of the Justice Department had recused themselves from one of the investigations to avoid the appearance of a potential conflict, not that the department had refused to cooperate. A Justice Department official, speaking on condition of anonymity to discuss sensitive issues, said other parts of the department were participating in the investigation, and a decision to recuse certain officials was routine.
OMB highlights successes of 25-point strategy on its 18-month anniversary. Federal CIO Steve VanRoekel said agencies saved $100 million from moving email to the cloud. There now are more than 1,000 qualified program managers in the new job series. The IT reform plan helps institute culture change from CIOs on down.
June 7, 2012(Encore presentation July 5, 2012)
The Homeland Security Department has created a task force to develop future workers. It will consider expanding DHS' involvement in cyber competitions and university programs, enhancing public-private partnerships and working with other agencies.
The White House has threatened to veto a House bill providing funding for the Homeland Security Department, taking issue with many of the bill's provisions, including a denial of a civilian pay raise. The committee bill also doesn't include any new funding for the agency's data-center consolidation efforts or construction for its new headquarters.
Google has sent out messages to some of its search engine users warning them they may be victims of a government-sponsored cyber attack.
Lynn McNulty was the State Department's first director of information systems security. He also served as policy liaison between NIST, agencies and Congress.
Google said Wednesday that it has added a feature to warn users whose accounts it believes are targets of "state-sponsored attacks," but the Internet giant did not cite a specific government.
Jeff Ait, director of Public Sector for Good Technology will talk about how his company can help you manage the mobile phones and tablets at your agency.
June 5, 2012
India outstripped the United States, China, Japan and Singapore for personal computer security, according to a recent study by McAfee.
Veteran Affairs' CIO Roger Baker pointed to concerns over cybersecurity as the reason why he's wary about agencies adopting bring-your-own-device initiatives.
The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.
The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.
A group called the Virginia Tech Intelligence and Defense Executive Alumni, or VT-IDEA, will hold an exhibition of new technology later this month. It's already seen commercialization of remote smartphone wiping technology.