Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
The director of intelligence at U.S. Cyber Command said the command has the capacity to significantly damage a country's infrastructure if necessary. Rear Adm. Samuel Cox said such an attack would only come after officials at the highest levels of government approved the operation because there would be a risk of collateral damage.
The top lawyer for U.S. Cyber Command, Air Force Col. Gary Brown, calls the Stuxnet attack the model of a responsibly conducted cyber attack. Catherine Lotrionte, the executive director of George Washington University's Institute for Law, Science and Global Security joined In Depth with Francis Rose to discuss Stuxnet.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
Lt. Gen. Bill Lord, the chief information officer of the Air Force, spoke with Federal News Radio's Jason Miller at the recent AFCEA Air Force IT Day in Vienna, Va.
Gen. Keith Alexander, head of both the National Security Agency and U.S. Cyber Command, says defense networks are not defensible from cyber attacks. His plan for getting back on track includes consolidating the number of networks and data centers and moving toward cloud computing.
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.
The outgoing chief of staff for U.S. Cyber Command said recently the military's professional cyber corps has strong, diverse capabilities.
The Navy's cyber command will welcome a new leader as it approaches its one-year anniversary since declaring full operational capability.
Rear Adm. Sean Filipowski will take over from Rear Adm. Jan Tighe as the deputy director of operations at Cyber Command.
The Government Accountability Office says the Defense Department needs to step up its cybersecurity training.
This cyber attack didn't go after people playing war games on their PlayStations. It targeted a company that helps the U.S. military do the real thing.
In a column for Federal News Radio, Ft. Meade Commander Col. Dan Thomas says, "By this fall, the official worker population of Fort Meade will have grown to more than 48,000. This is 13,000 more personnel than we had three years ago - you do the math: if BRAC growth is 5,400, who are all these other people?"
The Deputy commander of Navy Fleet cyber command Rear Admiral Bill Leigher explains the significance of this realignment.
The head of U.S. Cyber Command says cloud computing is part of his plan for staying ahead of the cyber threats that face the Defense Department. “A year from now we should be well on our way to having a hardened architecture proven and in place, which provides a new level of cybersecurity,” said General [...]
Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command.
The Cyber Command is focused on achieving real-time capabilities, but the director of current operations said they still have serious work to do. He appealed to industry leaders for help designing a sufficient platform.
The Navy's cyber command will soon be able to see a real-time view of penetration attempts into the service's IT systems, the command's number two officer said Thursday.
An event this week sponsored by Potomac Institute in Arlington, Va., evaluates government's cyber spending priorities.
DoD is expanding the use of demilitarized zones to improve security of its unclassified network. Over the next two years, DISA require all service applications to go through these buffer zones.