Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
Agencies must use only cloud services that have been approved under the Federal Risk Authorization and Management Program (FedRAMP) by June. OMB will receive more details on agency progress with the latest quarterly update through PortfolioStat. Meanwhile, FedRAMP's security baseline will be revised this summer.
Randy Wood, federal vice president of F5 Networks will discuss how Software Defined Application Services or SDAS, can benefit your agency.
February 25, 2014
Navy Cyber Forces, already headquartered in Suffolk, Va., will take over responsibility for building the knowledge workforce the Navy terms the "information dominance corps."
Departments have a week to finalize their plans to implement information security continuous monitoring by 2017. State and DHS already are heading down the new cyber path, and are excited to take advantage of the standard suite of products and services under the CDM contract.
Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency.
February 18, 2014
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.
U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.
Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.
On this week's Capital Impact show, executives from Liberty Group Ventures discuss the roll out of the administration's new cyber framework and how it will affect the private sector.
February 13, 2014.
Government officials, associations and companies are offering insight and comments on the recently released White House cyber framework.
NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.
The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.
App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.
Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.
Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.