Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
Auditors found no security weaknesses that present an immediate threat to the jobs portal or user information housed in its database. The test represented the site's first independent security evaluation since OPM took control over USAJobs.gov from Monster Government Solutions in Oct. 2011. Under MGS management, hackers broke into the portal twice in 17 months.
Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.
On this week's Bloomberg Government Capital Impact show, analysts will discuss which cybersecurity companies are being targeted for mergers and acquisitions. Plus, what's next in the internet tax debate and how are companies benefiting from the R&D tax credit.
August 2, 2012
The Senate failed Thursday to pass legislation to protect the U.S. electrical grid, water supplies and other critical industries from cyberattack and electronic espionage, despite dire warnings from top national security officials about the potential for devastating assaults on American computer networks.
The Social Security numbers and bank routing numbers of about 8,000 accounts were exposed in a cyber breach of an Environmental Protection Agency database.
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate
The contract includes "very stringent" IT security requirements. The announcement follows a data breach that affected 123,000 TSP participants in 2011.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Hits on infrastructure such as electricity grids and water supplies increased 17-fold between 2009 and 2011.
The Veterans Affairs Department will award a $5 billion IT hardware contract in the next two months. GSA will release a request for information for cybersecurity tools in the coming days. Both are examples of a healthy and busy fourth quarter for acquisition.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.
Dusty Wince, CEO of Knowledge Consulting Group will explain how his company can help your agency or business move securely to the cloud.
July 24, 2012
In a report from the Heritage Foundation, analyst Paul Rosenzweig said the bill still is intrusive, provides little liability protection for private owners and the proposed incentives would make the standards mandatory, not voluntary as lawmakers have claimed.
The European Union said it wants to hear from businesses, governments and citizens about their experiences on the Net.
Lt. Gen. Michael Flynn, who worked with elite special operations forces in Iraq and Afghanistan, is taking over Tuesday from Lt. Gen. Ronald L. Burgess Jr. as the senior military intelligence adviser to the secretary of defense and chairman of the Joint Chiefs of Staff.