Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Agencies are still facing several challenges when it comes to cybersecurity. They continue to deploy new technologies and business practices to fend off the cyber threats, but the Government Accountability Office says the number of data breaches has more than doubled over the last several years. Greg Wilshusen, director of Information Security Issues at the GAO, joined Federal Drive hosts Tom Temin and Emily Kopp to discuss the problem and GAO's ideas for fixing it.
House Veterans Affairs Committee members are fed up with repeated cybersecurity problems. They want the VA to improve its cybersecurity once and for all. A new bill tells the department exactly how to do it. The legislation is among the most prescriptive cyber bills that any agency has seen in almost a decade. Federal News Radio Executive Editor Jason Miller shares reactions to the bill with Federal Drive hosts Tom Temin and Emily Kopp. Read Federal News Radio's related article.
Rep. Jackie Walorski (R-Ind.) introduced the Veterans Information Security Improvement Act that would explicitly require VA to take steps to repair operational and procedure holes in its network and computer security processes.
The next version of cloud security standards is under development, even as agencies race to comply with current ones. The General Services Administration and the departments of Defense and Homeland Security are kicking off FedRAMP 2.0 by incorporating new NIST guidance. Federal News Radio Executive Editor Jason Miller joined Federal Drive hosts Tom Temin and Emily Kopp to explain how the agencies are keeping different standards aligned. Read Federal News Radio's related article.
DoD CIO Teri Takai clarifies the Pentagon plans to use the FedRAMP baseline. DHS and GSA are working together to ensure the continuous diagnostics and monitoring program and FedRAMP are aligned. But questions remain around how other cyber initiatives fit into the cloud security program.
The Pentagon plans to more than triple its cybersecurity staff in the next few years to defend against Internet attacks that threaten national security, Defense Secretary Chuck Hagel said. By 2016, the Pentagon should have 6,000 cyber professionals.
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
The National Initiative for Cybersecurity Education (NICE) is trying to promote cyber skills across several disciplines.
Federal officials say they need help from Congress to ensure companies are protected under the law for sharing cyber information with the government. Officials also say building up the cyber workforce is a top concern.
As agencies strive to make legacy applications available on any device, NIST is providing help by developing metrics and focusing on portability.
Congress will try again this session on cybersecurity legislation, but some of the problems that prevented it from passing the last several years are back again. Sen. Tom Carper (D-Del.), chairman of the Senate Homeland Security and Governmental Affairs Committee, talked to In Depth with Francis Rose about cyber legislation in his office on Capitol Hill today. He says the landscape looks a little different for the legislation this time around.
The "white hats" can never let up in the drive to stay ahead of cyber mischief makers. The Cyber Security Research Alliance recently announced its teaming up with Drexel and George Mason University to research some of the big cyber and physical security problems in the country. Lee Holcomb, president of the alliance and deputy of Technical Operations at Lockheed Martin's Information Systems and Global Solutions, spoke with Federal Drive hosts Tom Temin and Emily Kopp, about the work the group is doing. Lockheed Martin is a founding member of CSRA.
Data breaches happen in both the private and public sector. The latest victims include the IRS, Veteran Affairs and Target. So, whom do you call when your agency is under attack? The Secret Service might not initially come to mind, but it has a long history of protecting the nation's financial infrastructure from threats. Bill Noonan, the deputy special agent in charge of cyber operations for the Secret Service, recently testified before the Senate Judiciary Committee about the agency's experience in the cyber arena. He joined Federal Drive hosts Tom Temin and Emily Kopp to further discuss the agency's role in cyber.
The Pentagon will complete the Joint Regional Security Stacks in the European theater by the end of this year, two years earlier than planned. DoD already has begun to construct this regional cyber approach in the U.S. as part of its Joint Information Environment program.
GSA awarded a $47.3 million contract to Metrica Team Venture to provide software and services under the continuous diagnostics and mitigation program. DHS expects the dashboard to offer a more insightful view of the cyber health of agency networks starting this fall.
New Snowden document reveals NSA collects all phone calls in a single foreign country
Technology has made it a lot easier for small businesses to function over the past few years. But with that ease comes many cybersecurity concerns.
Gen. Keith Alexander, who will soon retire as the first commander of U.S. Cyber Command, said his organization has matured to the point that it should join the club of unified commands that report directly to the President.
A higher slot on the military's organizational chart for U.S. Cyber Command.
Rob Anderson, the chief of the Vision and Strategy Division in the Marine Corps Command, Control, Communication and Computers (C4) office, said reducing the monthly data and voice fees for even 50 percent of the current employees using BlackBerrys could mean as much as $5 million that the Marines could transfer to readiness and operations and maintenance accounts.
March 13, 2014