Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The contract includes "very stringent" IT security requirements. The announcement follows a data breach that affected 123,000 TSP participants in 2011.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Hits on infrastructure such as electricity grids and water supplies increased 17-fold between 2009 and 2011.
The Veterans Affairs Department will award a $5 billion IT hardware contract in the next two months. GSA will release a request for information for cybersecurity tools in the coming days. Both are examples of a healthy and busy fourth quarter for acquisition.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.
Dusty Wince, CEO of Knowledge Consulting Group will explain how his company can help your agency or business move securely to the cloud.
July 24, 2012
In a report from the Heritage Foundation, analyst Paul Rosenzweig said the bill still is intrusive, provides little liability protection for private owners and the proposed incentives would make the standards mandatory, not voluntary as lawmakers have claimed.
The European Union said it wants to hear from businesses, governments and citizens about their experiences on the Net.
Lt. Gen. Michael Flynn, who worked with elite special operations forces in Iraq and Afghanistan, is taking over Tuesday from Lt. Gen. Ronald L. Burgess Jr. as the senior military intelligence adviser to the secretary of defense and chairman of the Joint Chiefs of Staff.
Rob Strayer of the Bipartisan Policy Center's Homeland Security Project says the revised cybersecurity bill introduced in the Senate last week makes it voluntary for companies to comply with cybsecurity performance standards.
Rob Strayer of the Bipartisan Policy Center discusses the compromise cybersecurity bill. Daniel Schuman talks about the Congressional Research Service. Dick Gregg fills us in on the Treasury's annual fiscal report.
Piecemeal attempts to modernize an aging electric power grid have left it vulnerable to cyber attacks. Security has been an afterthought, according to a new report released by McAfee, a security technology company.
Victims need to speak up and report cyber attacks. That's the message from the Bipartisan Policy Center and top security officials, who say only a fraction of attacks are reported each year.
The revised Cybersecurity Act of 2012 removes DHS from having sole oversight authority of critical infrastructure and shares the responsibility across an interagency council. The bill also would make the implementation of cyber standards by critical infrastructure operators voluntary. The legislation encourages an incentive-based program.
The "Mahdi" virus records keystrokes, audio and screenshots from infected computers. The researchers believe the virus may have originated in Iran because the virus communicates with a server in Tehran.
Tougher cybersecurity regulations could be the final step for Stage 2 of the HITECH Act, which aims to implement electronic health records. The Centers for Medicare and Medicaid Services want hospitals to prove their EHRs are encrypted and secure.