Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Jeff Ait, director of Public Sector for Good Technology will talk about how his company can help you manage the mobile phones and tablets at your agency.
June 5, 2012
India outstripped the United States, China, Japan and Singapore for personal computer security, according to a recent study by McAfee.
Veteran Affairs' CIO Roger Baker pointed to concerns over cybersecurity as the reason why he's wary about agencies adopting bring-your-own-device initiatives.
The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.
The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.
A group called the Virginia Tech Intelligence and Defense Executive Alumni, or VT-IDEA, will hold an exhibition of new technology later this month. It's already seen commercialization of remote smartphone wiping technology.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
CIO Lt. Gen. Susan Lawrence said better systems at posts, camps and stations will let soldiers train on the same equipment as they use in the field. The move to the cloud, data center consolidation and enterprise email are pushing the Army toward a data-centric approach.
May 31, 2012
One senator is questioning why it took nine months for the Thrift Savings Plan board to find out about a sophisticated cyber attack that compromised 123,000 TSP participants' accounts. Sen. Susan Collins (R-Maine) also wants to know why Congress wasn't informed of the breach until more than a month after it was reported to the board.
Federal Technology Analyst Jason Wilson sizes up the defense cyber market. Defense Financial Analyst Sopen Shah looks at potential targets for mergers and acquisitions. Data Analyst Peter Brusoe looks at how federal contractors are donating money this campaign season.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
In an exclusive interview with Federal News Radio, White House Cyber Czar Howard Schmidt said a majority of the senior leaders in government understand the importance of securing agency, contractor and critical infrastructure systems. He said among his office's biggest accomplishments is moving the day-to-day cyber authority of federal civilian networks to DHS. Michael Daniel will replace Schmidt, whose last day is in early June.
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.
Ma Xiaotian, deputy chief of the general staff of the People's Liberation Army, said the cybersecurity issue is creeping from the virtual world into the real world.
Jason Wilson, a reporter for Bloomberg Government, examined federal defense spending on cybersecurity for a new Bloomberg study. He joined In Depth with Francis Rose to discuss the overall trends he's noticed.
A sophisticated cyber attack against the Thrift Savings Plan contractor responsible for maintaining the agency's data centers compromised the information of 123,000 TSP participants. However, there is no indication the data has been misused, according to the Federal Retirement Thrift Investment Board. There is also no indication that the TSP's network or its website were affected.
A Heritage Foundation report said of all the cybersecurity bills before Congress right now, the most important issue is the government would regulate activities in both the public and private sector.
The Financial Management Service moved many of its day-to-day IT operations to the Bureau of Public Debt. FMS is providing oversight and guidance for IT systems in return. John Kopec, FMS's chief information officer, said his next set of priorities is to use business intelligence and analytics tools on the data from the shared service providers.
May 24, 2012
Justice confirms it's investigating a data breach in its statistics department.
Secretary of State Hillary Rodham Clinton says U.S. cyber experts hacked al-Qaida propaganda online in Yemen, changing ads that bragged about killing Americans into ads that showed the death toll of al-Qaida attacks against Yemenis.