Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
NSA whistleblowers say agency casts wide net, Verizon order is part of 'routine'
Obama: Gov't not spying on Americans, surveillance programs needed to track terror threats
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Wall's 21, Ariza's 20 help Wizards snap Knicks' 5-game winning streak, 106-96
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The developing field of using social media to gather information can provide benefits to the intelligence community, but it also involves challenges. The changing environment of open source intelligence requires agencies and companies plan their approaches carefully.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
New security measures, including a new polygraph question, will help avoid leaks from intelligence employees, announced James Clapper, director of National Intelligence. Lawyer John Mahoney analyzes the legal responsibilities between agencies and federal employees.
Deputy Director Chris Inglis tells Federal News Radio a young workforce has put the National Security Agency in an unique position. Sen. Chuck Grassley (R-Iowa) says hospital emergency rooms throughout the country are reporting shortages of painkillers. Bloomberg Government reporter Danielle Ivory discusses a new program to help small, female-owned companies win federal contracts.
The pressing need for cybersecurity legislation has led to widely divergent paths in the House and Senate. The House has opted for a more incremental approach, while the Senate has crafted comprehensive legislation
Chris Inglis, the deputy director of the National Security Agency, said agencies need good managers and leaders, as well as employees with specific skill sets. He said NSA's balance between the three is helping it succeed at its core missions.
In his first interview ever, John DeLong, the compliance director at the National Security Agency, clears up the misconceptions that exist about his job as well as the work done in his office. He says compliance is where rules intersect with technology, people and the activities at NSA.
Gen. Keith Alexander, who runs the National Security Agency, endorsed the idea of using a cloud computing facility to share cybersecurity information with the private sector.