Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
A pair of Mexican drug smugglers in camouflage pants, bundles of marijuana strapped to their backs, scaled a 25 foot-high fence in the middle of the night, slipped quietly into the United States and dashed into the darkness.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
President Barack Obama is gearing up for a second term in office, but some members of his Cabinet are on their way out, experts tell Federal News Radio. The legwork for these top- tier changes and others is already in motion behind-the-scenes.
The Consortium for Cybersecurity Action, a newly-formed international group of government agencies and private organizations from around the world, today will release an updated baseline of the 20 most important cyber controls. The group wants to become a resource to help agencies implement those security checks. DHS already is developing a solicitation to make it easier for agencies to buy tools and services to implement several of the security checks.
The federal government is picking up the tab to restore power and provide transportation in the areas hardest hit by Post- tropical Cyclone Sandy.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The Federal Drive gets post-superstorm Sandy updates from the National Weather Service and the U.S. Coast Guard.
Nearly 170 people are reported stranded in New York City, where Coast Guard helicopters are now being deployed, said Coast Guard Lt. Cmdr. Jamie Frederick. Most calls the Coast Guard received this morning were inland-based, Frederick said.
An untold number of so-called zombies are coming to a counterterrorism summit attended by hundreds of Marines, Navy special ops, soldiers, police, firefighters and others to prepare them for their worst nightmares.
The American Civil Liberties Union sued the U.S. Department of Homeland Security over restrictions on taking photos and recording video at ports of entry, saying the policy prohibits the public from documenting possible misconduct by authorities.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
The draft solicitation asks for 15 toolsets and 11 service areas to help agencies implement continuous monitoring as-a-service and to buy sensors. DHS has asked vendors on GSA Schedule 70 to comment on the requirements.
Recruits in the Federal Air Marshal Service undergo 16 weeks of rigorous training to prepare for their primary duty - helping travelers reach their destinations unharmed. Every three months, air marshals receive refresher training in hand-to-hand defense, physical fitness and threat-scenarios aboard a life-size mockup of a passenger jet. Federal News Radio goes inside a flight simulator for a first-hand look at a training exercise.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
The Transportation Security Administration on Friday moved to fire 25 employees at Newark Liberty International Airport and suspend 19 others for what it said was improper screening of checked luggage, the latest in a series of problems at one of the country's busiest airports.
Homeland Security Department Secretary Janet Napolitano approved the reorganization plan earlier this week. The newly aligned Office of Cybersecurity and Communications expands from three divisions and creates a new performance-management office.
Republican lawmakers in the House and Senate wrote to President Barack Obama urging him to not issue an executive order setting voluntary cybersecurity standards for private-sector operators of critical infrastructure.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.