Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
Nobel Prize winner David Wineland of NIST discusses his accomplishments. And a contingent of large federal buildings might be getting a makeover. The National Capital Planning Commission shares plans the GSA is considering.
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
John Kasianowicz is the NIST project leader on a project coming up with a cheaper way to test DNA for possible illnesses. GAO's John Hutton says that few agencies are compiling inventories for their service contracts. Procurement attorney Joe Petrillo discusses a new inspector general's report. Dr. Harry Lambright of Syracuse University studied the effectiveness of two former federal officials. David Hall-Matthews talks about a ranking of nonprofits.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
A number of agencies have made high-profile migrations to cloud platforms and the Obama administration has issued sweeping guidance mandating agencies identify and transition services and applications to host in the cloud. For a look at how agencies are faring in their shifts to the cloud and the issues they continue to face, the Federal Drive with Tom Temin and Emily Kopp hosted a panel discussion, "Clearing the Fog Around Cloud Computing," sponsored by Level 3 Communications.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
Instead of using a lengthy security technical implementation guide approval process to decide which tablets and smartphones will be allowed to use its network, the Defense Information Systems Agency wants to put the ball in the vendors' court.
An updated how-to guidance for responding to cyber incidents is out.
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
The General Services Administration will hold a vendor day Aug. 7 in Washington, D.C. The concept of identity management in the cloud builds on the efforts included in the National Strategy for Trusted Identities in Cyberspace (NSTIC).
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
How is the government using big data currently?
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
NIST launched the National Cybersecurity Center of Excellence in February and now is giving industry details on how it will work. The center's goal is to bring businesses and government together to solve cyber problems.