Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Dan Juengst, senior cloud strategist for Red Hat discusses how his company is helping federal agencies with their cloud computing needs.
June 11, 2013
Snowden, an employee of Booz Allen, one of 500,000 contractors with top security clearance
Hagel says budget forces review of outside contractors such as NSA leaker
Booz Allen Hamilton announced Tuesday it has fired Edward Snowden, the contractor employee who admitted leaking details about classified National Security Agency programs to reporters. The company said Snowden was fired June 10 because he violated company policies, including its code of ethics.
Edward Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, revealed himself Sunday as the source of disclosures about the U.S. government's secret surveillance programs, risking prosecution by the U.S. government. Director of National Intelligence James Clapper called the revelation of the intelligence-gathering programs as reckless and said it has done "huge, grave damage."
NSA whistleblowers say agency casts wide net, Verizon order is part of 'routine'
Obama: Gov't not spying on Americans, surveillance programs needed to track terror threats
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Wall's 21, Ariza's 20 help Wizards snap Knicks' 5-game winning streak, 106-96
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The developing field of using social media to gather information can provide benefits to the intelligence community, but it also involves challenges. The changing environment of open source intelligence requires agencies and companies plan their approaches carefully.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
New security measures, including a new polygraph question, will help avoid leaks from intelligence employees, announced James Clapper, director of National Intelligence. Lawyer John Mahoney analyzes the legal responsibilities between agencies and federal employees.