Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.
Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton.
September 25, 2012
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.
The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.
OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.
Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements.
September 20, 2012
Despite several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government.
The Federal IT Acquisition Reform Act would codify much of the Obama administration's 25-point IT reform plan. The draft bill would go even further in attempting to address long-standing challenges for agency chief information officers.
Cyber criminals might unknowingly provide the impetus to help agencies address a cybersecurity skills gap. OPM also is working with agencies to address other shortfalls in key workforce competencies.
Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.
RSA and Booz Allen Hamilton said they will jointly develop new information security products and offer them as managed services.
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
Military's cyber leaders say job satisfaction has so far trumped salary concerns when it comes to building and retaining a workforce of elite cyber warriors. Building the capacity of that training pipeline is the next challenge.
The goal was to achieve an efficient, effective and accountable government. A key strategy was to change the way the federal employee approached the job. In part three of Federal News Radio's week-long, multimedia special report, The Obama Impact: Evaluating the Last Four Years, we examine the tactics employed to create a more efficient workforce; hiring and SES reform, reducing backlogs in security clearances and retirement claims, building a cyber workforce, telework and the overall support of the civil servant. Four were rated as effective, two as more progress needed, and one as ineffective.
The contract is part of DARPA's High-Assurance Cyber Military Systems.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
In part 2 of Federal News Radio's special report, The Obama Impact: Evaluating the Last Four Years, we examine the success and change brought by five technology initiatives. We rated three as effective, one as having made some progress, but more is needed, and a fifth as ineffective.
The Android vulnerabilities caused by slow patches are well-known and may be a concern for federal agencies who are considering the Bring Your Own Device model.
BAE said it also planned to circle the wagons around its cybersecurity arm handling sensitive government information.