Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
A unified IT architecture will create innumerable benefits to government and the private sector companies that serve its technology needs. But, disparate policymaking responsibilities across organizations such as OMB, GSA, NIST, DHS, and DoD make it difficult to realize that end game, say former federal executives Karen Evans and Julie Anderson.
The chief information and chief technology offices at the Commerce Department have generated more than $200 million in savings by taking a collaborative approach to purchasing IT and cybersecurity products.
The Office of Management and Budget released a new memo Tuesday detailing the steps and deadlines agencies must meet to implement information-system continuous monitoring. The mandate comes on the heels of the General Services Administration and the Homeland Security Department releasing the first task order for continuous diagnostics and mitigation (CDM) tools and sensors, of which Federal News Radio has exclusive details.
A self-described "hacktivist" will spend 10 years in prison for illegally accessing computer systems of law enforcement agencies and government contractors. Before hearing his sentence, an unrepentant Jeremy Hammond told a federal judge that his goal was to expose injustices by the private intelligence industry when he joined forces with Anonymous. "Yes I broke the law, but I believe sometimes laws must be broken in order to make room for change," he said. The Chicago computer whiz and college dropout insisted his hacking days are over but added, "I still believe in hacktivism as a form of civil disobedience."
Google is warning U.S. lawmakers that U.S. spying operations risk fracturing the open Internet into a "splinter net" that could hurt American business. In the first public testimony before Congress by a major technology company since former National Security Agency contractor Edward Snowden disclosed top secret surveillance programs, Google said it should be allowed to provide the public more information about government demands for user data.
In this week's edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz in the acquisition and IT communities that you may have missed.
On this week's Capital Impact show, Liberty Group Ventures President Kiersten Todt will discuss how corporations and the general public are handling the rollout of the cybersecurity framework.
November 13, 2013
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.
Obama administration considers splitting command of National Security Agency and cybersecurity
On this week's Capital Impact show, Bloomberg Government analysts will examine NIST's preliminary cybersecurity framework, and Google's lobbying efforts.
November 7, 2013
Questions mount over incomplete testing of HealthCare.gov website
Col. Jim Ekvall, chief of the electronic warfare division, joins Federal News Radio DoD reporter Jared Serbu on this week's edition of On DoD.
The Homeland Security Department has received a mixed report from the inspector general on coordinating cyber operations across government, along with seven recommendations for improvement.
Adobe Systems Inc. says that the scope of a cyber-security breach disclosed nearly a month ago was much worse than initially reported. They now say attackers obtained data on more than 38 million customer accounts. The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
Singapore's government is on heightened alert for cyber-attacks after threats from claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action. "Government agencies have been on heightened vigilance and have enhanced the security of their IT systems in response to the declared threats against the government's ICT infrastructure," the Infocommunications Development Authority of Singapore (IDA) said in a statement.
The Homeland Security Department plans to send the final draft version of the National Infrastructure Protection Plan to President Barack Obama this week. Some industry experts say DHS failed to incorporate much of what was discussed at 30 meetings.
Obama claims 'full responsibility' for health care website fixes as security concerns surface
Army Research Lab is partnering with universities and scientists to explore the psychology behind cybersecurity.
In a message to senior executives, Secretary Eric Shinseki said that Stephen Warren now will hold the title of executive in charge, Office of Information and Technology and chief information officer. The title change comes as the House Veterans Affairs Committee is turning up on the heat once again on the agency's ability to secure its systems and protect data.
With the partial government shutdown behind them, members of Congress are working on several bills that impact the federal workforce, including a resolution that supports ending the federal pay freeze and a bill that tackles the claims backlog at Veterans Affairs.