Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
May 23, 2014
Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.
The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.
Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.
Trust boils down to workers demonstrating a sense of reliability and consistency. With reliability and consistency, "people begin to depend on each other to get things done in the workplace." Without it, an agency can be doomed, says Michael Gelles of Deloitte.
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.
Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
May 19, 2014
Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.
Sen. Tom Carper (D-Del.), chairman of the Homeland Security and Governmental Affairs Committee, said Thursday the committee plans to mark up a bill on May 21 to give DHS more tools to hire cyber workers more easily.
The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.
Rising stars in the cybersecurity field came together at the University of Massachusetts Boston recently to hone their skills.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
DHS says it found out about the Heartbleed vulnerability at the same time everyone else did. But unlike most other organizations, it had to wade through layers of legal negotiations before it could help federal agencies fix the cyber vulnerability in their own systems.
Agencies are getting smarter about cyber. The Homeland Security Department and General Services Administration are fine-tuning a contracting vehicle for tools that let agencies not only monitor their computer networks 24/7, but also fix things that go wrong. The umbrella term for the tools is continuous diagnostics and mitigation (CDM). Xceedium is a supplier of CDM software products. Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what's in store for phase two of CDM.
The agency that runs federal employees' (401)k-style Thrift Savings Plan needs to do a better job monitoring potential cyber incidents against its website, strengthen security at its data centers and come up with a plan for tracking all of its technology hardware. That's according to recent audits of the TSP program undertaken by the Labor Department, which were presented to the Federal Retirement Thrift Investment Board Monday.
The Securities and Exchange Commission is asking 50 registered investment advisers and broker-dealers for more information about how they protect their systems from cyber attacks.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. GSA and SBA continue their ongoing quarrel over the Office Supplies 3 contract, and April marks the three-year anniversary of NSTIC's release.
Verizon's annual data breach report says federal employees cause nearly 60 percent of reported cyber attacks in government. And 34 percent of those breaches come from small mistakes, like emailing documents to the wrong person. Mark Forman, former administrator of the Office of e-Government and IT or the first federal CIO, is vice president for IT services and cloud initiatives at TASC. He tells In Depth with Francis Rose you and your co-workers could be the reason for a cyber breach at your agency.
HealthCare.gov users told to change passwords after government's Heartbleed probe