Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Obama administration considers splitting command of National Security Agency and cybersecurity
Despite progress by some agencies in processing FOIA requests, Patrice McDermott of OpenTheGovernment.org says its difficult to measure how open the government really is.
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.
The National Security Agency on Thursday disputed a published report that secret intelligence budget files provided by agency leaker Edward Snowden show that the surveillance agency warned in 2012 that it planned to investigate up to 4,000 cases of possible internal security breaches.
President Barack Obama is directing his national intelligence director to form a panel of outside experts to review government intelligence and communications technologies
The Privacy and Civil Liberties Oversight Board is responsible for investigating the balance between counterterrorism security and Americans' privacy. The board is working toward a report on the National Security Agency's surveillance programs.
The Rules Committee voted late Monday to allow the House to begin voting on NSA amendments. The amendments cut funds for surveillance programs and impose limits on their operations.
Evan Lesser, founder and director of ClearanceJobs.com, discusses the potential impact of the NSA security leaks.
June 21, 2013
Obama meets with privacy and civil liberties panel that oversees anti-terror programs
Watchdog says contractor that performed background check of NSA leaker under investigation
On this week's Capital Impact show, Bloomberg Government analysts will discuss how U.S. providers are being affected by the NSA Survelliance controversy, and the impact of the Affordable Care Act.
June 20, 2013
Intelligence community contractors, similar to Booz Allen, likely are reevaluating employees who have access to classified information in order to identify any questionable personnel, according to Steve Ryan, leader of government strategies practice group at McDermott, Will and Emery law firm.
Government contractors with security clearances, such as Edward Snowden, aren't legally protected from whistleblowing even by going through the proper channels. But John Mahoney, of the law firm Tully Rinckey, said Snowden should have defaulted to the standard whistleblowing procedure used by government employees in the intelligence community, who are protected under the law.
In the wake of the NSA security leak, questions are being raised about the security clearance process for which Edward Snowden was subjected. One security clearance expert tells Federal News Radio, that while the process for granting security clearances has become more efficient over the past few years, it has not become more effective.
NSA director says surveillance programs disrupted dozens of terrorist attacks