Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Jason Healey, the director of the Cyber Statecraft Initiative for the Atlantic Council, endorsed an approach that would turn how government and the private sector work together to battle cyber threats on its head.
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cyber criminals to infect PCs, according to a person familiar with the situation. A former Russian police detective in contact with Russia's federal government told Reuters that the suspect, who is known in hacking circles as "Paunch," had been arrested.
The U.S. National Security Agency swept up 70.3 million French telephone records in a 30-day period, according to a newspaper report Monday that offered new details of the massive scope of a surveillance operation that has angered some of the country's closest allies. The French government summoned the U.S. ambassador for an explanation on Monday and renewed demands for talks on protection of personal data, as well as pledges that the surveillance would cease.
In a special commentary, Federal News Radio's Tom Temin asks, where were the crowd-sourcing, cloud-computing, agile-developing, data-dot-goving, code-a-paloozing studs who have been swept into so many agencies by the Obama administration before the launch of HealthCare.gov?
Inside the Reporter's Notebook: Acquisition, IT trends; Is cybersecurity awareness month still necessary?
News and buzz in the acquisition and IT communities that you may have missed this week.
Federal employees are eligible for a free one-day training session in early November on implementing continuous monitoring. The goal is to help agencies make good use of the continuous diagnostics and monitoring contract DHS awarded in August.
This discussion explores how agencies are protecting sensitive data, reducing risk
and curtailing the costs associated with data breaches while ensuring compliance
with expanding government data privacy policies.
Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss.
Eugene Spafford, a professor of computer science at Purdue University, and the executive director of the Center for Education and Research in Information Assurance and Security (CERIAS), a campus-wide institute for cybersecurity, said feds need to be held responsible for cyber problems and that would help improve the overall security state of the government.
October 17, 2013
In this week's edition of Agency of the Month, John Hickey talks about bringing vendor-agnostic, commercial-off-the-shelf mobility solutions at all classification levels to the Department of Defense.
Dr. Devin Jopp, CEO of the Workgroup for Electronic Data Exchange, will talk about his organization and the benefits of exchanging health care data electronically.
October 15, 2013
Homeland Security News is reporting that if hackers can steal a company's top-secret data, they can just as easily destroy a company's network. Richard Bejtlich, chief security officer for Mandiant, a cyber-security company, said not only are hackers getting into networks to steal huge amounts of intellectual property but they can also permanently erase data.
Cyber security advocates are frustrated that new legislation is caught between a rock and a hard place. It's stuck in contentious debates over government surveillance and the government shutdown. NSA's highly skilled cyber workers have been told to stay home, weakening the nation's ability to protect critical cyber infrastructure. Thousands of people with PHDs and math whizzes and thousands of computer scientists have been sitting idly at home.
When a Washington based web solution firm received an email from a furloughed fed looking for temporary work, the firm immediately jumped on the idea to create a website with job postings for freelance work. From idea to execution, unfurlough.us was launched in just five hours.
A partnership between the Homeland Security Department and NASA has led to the creation of a new technology called Finding Individuals for Disaster and Emergency Response (FINDER).
Deron Burba, the Smithsonian's CIO, said the organization will launch 3-D technology this fall to let researchers and others explore digital images like never before.
October 10, 2013
On this week's Agency of the Month show, David Bennett and Julie Mintz of DISA discuss providing cloud services for the Defense Department.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
Your agency's chief information security officer has a problem that might not have a solution. The online ecosystem of apps and mobile devices is creating a perfect storm of incoming threats and financial challenges. Hord Tipton, executive director of the information security non-profit (ISC)², is the former chief information officer of the Interior Department.
DoD's Health Management Systems Modernization Program seeks input from vendors on the current capabilities of electronic health records in the commercial market. The Defense Intelligence Agency issued a draft request for proposals in late September for the multiple-award Enhanced Solutions for the Information Technology Enterprise (E-SITE) contract, which could be worth $6 billion.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.