Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.
Glenn Schoonover from Koolspan will discuss mobile security with host John Gilroy.
February 19, 2013
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Senior administration officials say the Executive Order is not a replacement for comprehensive cybersecurity legislation, but the start of a new conversation for how best to protect the nation's critical infrastructure. NIST released an RFI Tuesday as part of its effort to create a voluntary, flexible framework. And DHS will expand the number of companies the government shares classified and unclassified cyber threat information with through the Defense Industrial Base pilot.
Through the Digital Government Strategy, several initiatives are underway to address IT security concerns. DHS created a security baseline architecture and is testing it through five use cases. GSA created a new secure online content platform for agencies to move websites and applications into a mobile environment.
OMB and NIST are seeking help from industry and academia on how to integrate cloud computing and the large amount of information that is created from mobile computing. The goal is not just to know what data agencies have, but the value the data brings. With all this focus on cloud and big data integration, could agencies be on the hook for a new "big data" strategy?
The Postal Service issued a draft solicitation for the Federal Cloud Credential Exchange. The goal is to create a cloud-based service to perform identity authentication and verification. Agencies could plug into the service, integrating it with any application that adheres to the standards.
IT Lab Director Charles Romine said the organization collaborates with an ever-growing number of agencies on technology challenges. He said the Lab also is focusing on questions around cloud, cybersecurity, mobile computing and big data.
January 10, 2013
Dr. A. Hunter Fanney talks about a house the NIST Engineering Lab is using to study green technologies. Dr. Cheryl Martin discusses the Energy Department's recent round of grants to foster new technology. Financial Planner Arthur Stein discusses the impact of FERS over the last 25 years. Pete Kasperowicz of The Hill newspapers reviews upcoming legislation on Capitol Hill.
The mobile revolution isn't new to many agencies. Laptops and BlackBerrys have been standard issue for many government executives for the last decade. What is different, however, is the widespread use of smartphones and tablet computers. Both agencies and citizens hold new and more immediate expectations because of these devices, and the government must adapt to this technololgy. In our special report, Gov 3.0: It's Mobile, Federal News Radio explores how some agencies are meeting the demand internally and externally for mobile devices and apps. The challenge, like any new technology, is ensuring these devices actually help meet mission goals and don't become just another shiny toy.
Sen. Mark Warner (D-Va.) describes the bipartisan support around the DATA Act. Michael Courts of the GAO recaps his testimony on diplomatic security related to the attack on the U.S. consulate in Benghazi. Charles H. Romine of NIST explains how medical professionals can make meaningful use of electronic records.
Dawn Leaf takes over for Tom Wiesner who retired in June.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
Nobel Prize winner David Wineland of NIST discusses his accomplishments. And a contingent of large federal buildings might be getting a makeover. The National Capital Planning Commission shares plans the GSA is considering.
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
John Kasianowicz is the NIST project leader on a project coming up with a cheaper way to test DNA for possible illnesses. GAO's John Hutton says that few agencies are compiling inventories for their service contracts. Procurement attorney Joe Petrillo discusses a new inspector general's report. Dr. Harry Lambright of Syracuse University studied the effectiveness of two former federal officials. David Hall-Matthews talks about a ranking of nonprofits.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.