Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The Pentagon will release a new strategy Thursday to address the growing spectrum needs. It will emphasize agile sharing of radio spectrum between government and industry.
Rafael Borras, undersecretary for management at the Homeland Security Department for the last four years, who recently left DHS to return to the private sector, said the Homeland Security Department needs a tactical, sustained effort to improve employee satisfaction. He said that kind of effort has helped change the way DHS oversees and implements IT programs.
Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.
This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.
Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency.
February 18, 2014
The Pentagon leverages the buying power of 2.6 million DoD personnel in the Air Force, Army and Defense Information Systems Agency in signing joint enterprise license agreement with CDW-G.
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.
DHS ICE issued a solicitation looking for a vendor to provide technology to let law enforcement officers hook into the National License Plate Recognition Database.
In this week's edition of Inside the Reporter's Notebook: USAID and the Medicaid and CHIP Payment and Access Commission (MACPAC) search for new CIOs; DoD asks for vendor input on what statutes negatively impact procurement regulations; and efforts to make federal grants more transparent and accountable receive strong support from good government groups.
U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.
Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.
The Army's Rapid Equipping Force is unpacking the results of a new demonstration designed to crowdsource soldiers' top-priority battlefield needs.
Brig. Gen. Kevin Nally, the Marines Corps CIO, said the service is updating its network hardware and collapsing five unclassified networks into one.
February 13, 2014
Government officials, associations and companies are offering insight and comments on the recently released White House cyber framework.
NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.
The National Geospatial-Intelligence Agency is focusing on four programs to add more value to how it delivers GIS content and services to the DoD and intelligence communities. Director Letitia Long said the community is in phase three of the evolution of using and sharing geospatial information.
This week on Federal Tech Talk, host John Gilroy interviews Dan Chenok, vice chair of ACT-IAC, and Rick Smith, co-chair of ACT-IAC's Smart Lean Government Initiative.
February 11, 2014
In the midst of the current decline in federal defense spending, the Commonwealth of Virginia is taking steps to ensure that companies in the state's multi-billion dollar defense industry are able to find new business opportunities. It's a program that goes beyond the usual "goodwill tour". This week on "AFCEA Answers," we'll examine the "Going Global" initiative with Paul Grossman, vice president of international trade with the Virginia Economic Development Partnership; and Brian Dearing, vice president of business development and government relations with HDT Global. The initiative is designed to help prepare Virginia businesses to find new markets beyond American shores, and develop business strategies to help them win their share of this business.
The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.
App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.
PortfolioStat is widely deployed across federal agencies and thus well worth exploring how we may be able to maximize the benefits derived from it.