Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Computer experts at the secretive National Security Agency are teaming up with the Homeland Security Department in an effort to strengthen the nation's defenses against cyber attacks.
A former deputy director of the NSA has urged CIOs to become more proactive in their approach to corporate security consciousness.
$1.2 billion contract awarded to build a 1.5 million square foot data center for NSA. The facility will also provide technical assistance to the Homeland Security Department to protect federal civilian agency networks.
Also, most of the malware on federal networks are after money, not intel
But, one columnist argues, it's what's politically possible.
The Defense Department says an investigation has identified dozens of members of the military and defense contractors that have allegedly obtained child pornography. Many of those involved are said to have access to top secret information. Some of those implicated to are connected to the National Reconnaissance Office and the National Security Agency. The Boston Globe first reported the story after obtaining documents through the Freedom of Information Act. Some have already been prosecuted.
Thomas A. Drake could spend the next 35 years in jail.
There are some real concerns coming from several directions over the program.
Boeing to acquire cybersecurity company
Learn more in today's cybersecurity update.
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
From NSA to the TSA -- CIO Emma Garrison-Alexander explains her experiences this week on the show.
May 27, 2010
New Cyber Command will better integrate existing and new computer network defense capabilities. DoD right now is spread too thin to protect its 15,000 networks and 7 million computing devices. The military too often is playing catch up to cyber attacks.
It's competition time for the armed forces universities. The National Security Agency and the Central Security Service are testing the five U.S. service academies during the 10th annual Cyber Defense Exercise. Teams will be tested on their ability to defend computer networks the students designed themselves. The winner will take home the coveted CDX trophy. The competition will take place at Lockheed Martin in Greenbelt, Maryland.
OMB shifts to real time cybersecurity monitoring, cyberdefenses put to the test during annual NSA exercise, FCC considers testing cybersecurity compliancy
NSA opens up to Maryland contractors, Cyber Command nominee says policies aren't clear
Lt. Gen. Keith Alexander tells lawmakers that the organization "will not militarize cyberspace." He also details how the Cyber Command will help DHS protect .gov and .com networks. Senate Armed Services Members say Alexander is well-qualified to lead the command.
Hackers, terrorist organizations, cyber criminals, and nation states routinely target government and corporate entities for financial gain, military intelligence, warfare, and sometimes just for notoriety and fame. Government agencies and corporations have traditionally addressed this threat independently, but the evolution of cyberspace has changed the rules. A unified front between the private and public sector has become more critical to combat these cyber threats.
The public and private sectors are becoming increasingly interdependent - the operation of our nation's critical infrastructure, including the national power grid, transportation systems, and communication networks, depends upon the ability of public and private sector networks to share information via cyberspace. Likewise, our nation's economic superiority is predicated on our ability to maintain competitive advantages in capital markets. Our enemies are not only looking for ways to exploit vulnerabilities in our critical infrastructure, but they are also increasingly looking for ways to steal our private sector's intellectual property in order to weaken our economic standing and gain an advantage in the global economy.
Google's disclosure of "sophisticated" cyber attacks on its infrastructure reportedly originating in China offers a good example. The Washington Post recently reported that Google and the National Security Agency (NSA) are forming an alliance "to better defend Google - and its users - from future attack." Putting the agreement in place will enable the NSA and Google to share critical information to analyze the attack without violating privacy laws or policies. This alliance will help Google better defend its intellectual property critical to our nation's economy while providing NSA key insight into the attack methods and motives of the attackers.
The need for such partnerships is certain to grow and will most likely extend to organizations that are not as large and resourced as Google but are just as critical to the strength of our nation's economy. Our adversaries are using similar attack methods to compromise systems across both sectors but they have not effectively partnered to share threat intelligence or early warning indicators. A formal partnership between the private and public sector allows the country to develop a unified and coordinated approach to defending our nation's assets.
There is a new alliance in the battle for cybersecurity. Though neither side has confirmed it, The Washington Post recently reported that Google has asked the NSA to help investigate the mid-December cyber attack against its networks "to better defend Google - and its users - from future attack." This partnership demonstrates the increasing interdependencies between the public and private sector in defending against cyber threats.
Information Assurance Director
Sept. 3, 2009