Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Hagel says budget forces review of outside contractors such as NSA leaker
Booz Allen Hamilton announced Tuesday it has fired Edward Snowden, the contractor employee who admitted leaking details about classified National Security Agency programs to reporters. The company said Snowden was fired June 10 because he violated company policies, including its code of ethics.
Edward Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, revealed himself Sunday as the source of disclosures about the U.S. government's secret surveillance programs, risking prosecution by the U.S. government. Director of National Intelligence James Clapper called the revelation of the intelligence-gathering programs as reckless and said it has done "huge, grave damage."
NSA whistleblowers say agency casts wide net, Verizon order is part of 'routine'
Obama: Gov't not spying on Americans, surveillance programs needed to track terror threats
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Wall's 21, Ariza's 20 help Wizards snap Knicks' 5-game winning streak, 106-96
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The developing field of using social media to gather information can provide benefits to the intelligence community, but it also involves challenges. The changing environment of open source intelligence requires agencies and companies plan their approaches carefully.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
New security measures, including a new polygraph question, will help avoid leaks from intelligence employees, announced James Clapper, director of National Intelligence. Lawyer John Mahoney analyzes the legal responsibilities between agencies and federal employees.
Deputy Director Chris Inglis tells Federal News Radio a young workforce has put the National Security Agency in an unique position. Sen. Chuck Grassley (R-Iowa) says hospital emergency rooms throughout the country are reporting shortages of painkillers. Bloomberg Government reporter Danielle Ivory discusses a new program to help small, female-owned companies win federal contracts.
The pressing need for cybersecurity legislation has led to widely divergent paths in the House and Senate. The House has opted for a more incremental approach, while the Senate has crafted comprehensive legislation