Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
Charlie Armstrong, the chief information officer at Customs and Border Protection, joins Federal News Radio for a free online chat on October 30, 2014.
The Energy Department developed a new tool to ensure outdated software doesn't remain on its network to create cyber vulnerabilities. Rick Lauderdale, Energy's chief architect, said business and mission leaders receive a dashboard view of potential problems.
The Marine Corps will begin a small scale pilot in the next several weeks to determine whether commercial-grade security containers on mobile devices can meet DoD's security demands. If it's successful, Marines envision a BYOD strategy that begins implementation as soon as next year.
NASA Ames CIO Jerry Davis joins Federal News Radio for a free online chat to discuss his IT priorities for NASA Ames, including workforce development, big data analysis and his efforts to improve the center's cybersecurity.
Jerry Davis, the NASA Ames CIO, said being in the heart of Silicon Valley poses different obstacles when it comes to recruiting and retaining IT employees. He said cloud and cyber are among his top priorities.
The Homeland Security Department has reviewed about 18 new or improved cybersecurity tools or technologies that may be added to the continuous diagnostics and mitigation program (CDM). John Streufert, the director of Federal Network Resilience at National Protection and Programs Directorate in DHS, said CDM is not delayed and on track to deliver results.
A new Federal News Radio survey of federal chief information officers and deputy CIOs found cyber above all else is the top priority. Charlie Armstrong, the CIO for Customs and Border Protection, said his focus is to protect the data first and foremost and his systems a very close second.
The White House wants the government to lead a nationwide effort to reduce identity theft and fraud. More secure government credit cards and multi-factor authentication for federal websites dealing with sensitive citizen data are two ways to do that.
The Office of Management and Budget is pushing back against the recent critical report on federal cloud computing efforts by 19 civilian agency inspectors general.
Embedding cybersecurity into the Defense Department's design, manufacturing, and supply chain is a goal the Pentagon sees is possible. Mike Papay is Chief Information Security Officer and Vice President at Northrop Grumman, and Frank Cilluffo is director of the George Washington University Cybersecurity Initiative and the Homeland Security Policy Institute. On In Depth with Francis Rose, they offered steps the DoD can take to address the issue.
SAIC's Mary Mayonado and Bill Kaczor join Federal News Radio's Custom Media Director Jason Fornicola for a free online chat to discuss the challenges in managing threats throughout the full cybersecurity life cycle - beyond just compliance requirements. Ask the industry experts live and learn about cyber's big picture, how to use data analytics to protect against insider threats, and what they're hearing from customers.
The Council of Inspectors General analyzed 77 commercial cloud contracts across 19 civilian agencies and found most failed to implement federal guidance and best practices. Auditors found these shortcomings could put data and systems at a greater risk to cyber attack or data theft.
Michael Daniel, the White House cyber coordinator, said the administration believes getting cyber legislation through Congress on small pieces is more likely to be successful than in one comprehensive bill. Legislation to update FISMA, to improve information sharing and to expand the workforce all have garnered bi-partisan support.
In fiscal 2015 FISMA guidance, OMB is trying to close a big hole exposed during the government's reaction to the Heartbleed vulnerability. The White House is giving DHS the authority to regularly conduct proactive scans of certain civilian agency networks. DHS made it clear to Congress earlier this year the delay in getting permission from agencies to scan their networks cost them days in response time during Heartbleed.
Pentagon wants to discourage other countries' cyber attacks by convincing them that that DoD will respond, and that the attacks will ultimately prove unsuccessful. Step one is conveying those messages more forcefully.
The goal of the scorecard or dashboard would be to give government leaders a better sense of just how secure agency networks are from hackers. As the 11th annual National Cybersecurity Awareness Month begins, DHS is doing much less education about why securing computers and networks is important.
The leader of the Army's new Cyber Center of Excellence says his job is not merely to build the cyber workforce, but to integrate that up-and-coming capability with the Army's existing signals and intelligence disciplines.
Cyber operations is about the only area of the DoD budget that hasn't been subject to cuts. But the new leader of the Army's Cyber Center of Excellence says that doesn't mean the Army can grow its newest military discipline in isolation. Federal News Radio DoD reporter Jared Serbu has the details.
The Office of Personnel Management has a list of 25 different conferences that comply with federal training regulations. Dan Waddell is director of government affairs for the cybersecurity non-profit (ISC)2. OPM just added their fourth annual Security Congress event to its list of approved conferences. On In Depth with Francis Rose, Waddell explained how the event got on the list.