Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Homeland Security News is reporting that if hackers can steal a company's top-secret data, they can just as easily destroy a company's network. Richard Bejtlich, chief security officer for Mandiant, a cyber-security company, said not only are hackers getting into networks to steal huge amounts of intellectual property but they can also permanently erase data.
Cyber security advocates are frustrated that new legislation is caught between a rock and a hard place. It's stuck in contentious debates over government surveillance and the government shutdown. NSA's highly skilled cyber workers have been told to stay home, weakening the nation's ability to protect critical cyber infrastructure. Thousands of people with PHDs and math whizzes and thousands of computer scientists have been sitting idly at home.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
Your agency's chief information security officer has a problem that might not have a solution. The online ecosystem of apps and mobile devices is creating a perfect storm of incoming threats and financial challenges. Hord Tipton, executive director of the information security non-profit (ISC)², is the former chief information officer of the Interior Department.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.
Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.
Inside the Reporter's Notebook: OMB adds clarity to new cyber policy; Cyber risks during shutdown overstated; OASIS delayed inde
The White House is finalizing its first major cybersecurity policy in more than three years.
Even though government agencies are in shutdown mode, contractors are still moving ahead in making business decisions. Small businesses are likely to hurt more from the shutdown due to smaller cash reserves and slimmer margins.
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Jim Williams and Rick Holgate from ACT-IAC will fill us in on next month's 2013 Executive Leadership Conference in Williamsburg Virginia.
September 17, 2013
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency.
September 10, 2013
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.
The Department of Energy first reported in August 14,000 current and former employees had their Personally Identifiable Information stolen. The department now says that number is nearly four times what it had originally thought.