Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Nov. 15 is the deadline for the Centers for Medicare and Medicaid Services to patch up the cybersecurity holes in the Healthcare.gov website. The Government Accountability Office offered 22 technical recommendations to the agency last week. Those problems appear just as the website nears its first birthday. Raj Sharma is co-founder and CEO of the Censeo Consulting Group. On the In Depth with Francis Rose Industry Chatter segment, he shared some ways to predict, and fix, longstanding problems with large federal IT projects like Healthcare.gov.
Report: Government's own 'white-hat' hackers give HealthCare.gov mixed review on security
Allen Harper, vice president and chief hacker for Tangible Security will discuss how his company is helping federal agencies with their cybersecurity challenges.
September 23, 2014
The FBI will channel more people and resources into its Pittsburgh office. It's a reward for the cybersecurity team that's credited for catching five Chinese military leaders stealing trade secrets, and a Russian-based cyber crime ring that stole about $100 million from banks around the world. Michael McKeown is supervisory special agent for the Associate Division Counsel, part of the FBI Cyber Initiative and Resource Fusion Unit based in Pittsburgh. On In Depth with Francis Rose, he explained the cybersecurity effort that earned the extra resources.
Cybersecurity is emerging as a major business risk. USIS, the government's main contractor for security background checks, had a big contract canceled. A security breach exposed personal information about 25,000 Homeland Security employees. It doesn't matter that the company discovered and reported the breach itself. Kiersten Todt and Roger Cressey are former feds and now principals of Liberty Group Ventures. They joined Tom Temin on the Federal Drive to discuss strategies for not becoming the next USIS or Home Depot.
Marilyn Tavenner, the Centers for Medicare and Medicaid Services administrator, promised House lawmakers Thursday that the site would be better protected when open enrollment begins in two months. The recent attack on the HealthCare.gov didn't succeed in stealing any data, DHS says. But some lawmakers say a year into the Affordable Care Act, the website still has basic cybersecurity challenges that should have been fixed.
Senate investigation says China hacked into military contractor networks at least 9 times
Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.
The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.
The Army's new dedicated career branch for cyber specialties could be up and running as soon as October.
Booz Allen Hamilton Senior Vice President Brad Medairy, will discuss how Continuous Diagnostics and Mitigation (CDM) can help your agency meet its cybersecurity challenges.
September 9, 2014
Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.
Evan Lesser, founder and director of ClearanceJobs.com will discuss how cleared professionals should be dealing with social media.
September 5, 2014
Hackers break into HealthCare.gov but officials say no consumer data compromised
Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.
Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.
The Environmental Protection Agency can't keep track of the data it stores in the cloud. EPA's Inspector General says it a subcontractor for a water permit system was using a cloud system to run its share of the operation, but neither the agency nor the prime contractor was aware of it. Albert Schmidt is an IT auditor of Information Resources Management and audits for the EPA's Inspector General. He says this type of cybersecurity problem isn't entirely the agency's fault.
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system.
August 26, 2014
Labor Department Deputy CIO Dawn Leaf joins Federal News Radio for an online chat to discuss her priorities around IT modernization, data center consolidation and cybersecurity.