Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Federal officials say Chinese hackers broke into the networks of the Government Accountability Office and the Government Printing Office back in March. While news of Chinese cyber attacks on federal agencies isn't unprecedented, the March attacks, first reported by the New York Times, have some observers scratching their heads. They say it's unclear why those two agencies would be targeted -- particularly in the case of GPO. Steve Bucci is director of the Douglas and Sarah Allison Center for Foreign and National Security Policy at the Heritage Foundation. He's also former deputy assistant Defense secretary. He said the attacks shouldn't come as a surprise on In Depth with guest host Jared Serbu.
Cyber criminals are adjusting so quickly that it's become an 'arms race' between them and agency technology officers trying to guard against threats. During a recent Federal News Radio panel discussion, officials shared expertise and tactics for protection.
The nation's top intelligence official says transparency is going to have to be a feature of the intelligence community from now on. Gen. James Clapper, the director of national intelligence says that's his main takeaway from the Edward Snowden leaks and their continuing fallout. Clapper is the guest on the latest edition of AFCEA Answers on Federal News Radio. In this excerpt, he told host Max Cacas he makes no apologies for the programs Snowden exposed, but intelligence agencies need to do a better job of explaining why they do what they do.
The Justice Department is asking Congress for more resources to fight cybercrime. Yesterday, a top official told Senators cyber criminals are becoming so sophisticated that the department, and the FBI in particular, are adapting their tactics and tools on a minute-by-minute basis. That might not be fast enough. The FBI estimates 500 million computers are infected by botnets each year, meaning that there are 18 victims per second. Levi Gundert is a former secret service agent and now a technical lead with Cisco's Threat Research, Analysis and Communications team. He told Emily Kopp on the Federal Drive that the government deserves credit for building partnerships that can track and find cyber criminals.
Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
July 14, 2014
Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
July 11, 2014
Report: Chinese hackers break into US personnel networks, target security clearance files
Julie Perkins hosts a roundtable discussion of the latest developments in cybersecurity.
July 11, 2014
Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."
When it comes to critical infrastructure cybersecurity, White House policy has federal agencies and the private sector joined at the hip. So it matters to the federal government how good the private sector is at cyber. Unisys and the Poneman Institute surveyed companies who operate critical infrastructure. The picture isn't great. Mark Cohn, the chief technology officer of Unisys Federal Systems, joined Tom Temin and Emily Kopp on the Federal Drive to discuss the results of the survey.
The Senate Intelligence Committee has approved the Cybersecurity Information Sharing Act. The legislation is designed to expand information shared about cybersecurity threats and defensive mechanisms between the government and companies and within the private sector. The goal is to combat the rapid increase in attacks on computer systems that have resulted in the theft of millions of Americans' personal information and hundreds of millions of dollars in losses for businesses.
The Senate would like to grant new powers to federal chief information officers and update federal IT laws that haven't gotten much attention for the past dozen years. Those are a couple of the effects of new legislation the Senate Homeland Security and Governmental Affairs approved recently. One of the bills is the Senate version of the Federal IT Acquisition Reform Act -- the other is an update to the Federal Information Security Modernization Act, which Senators have been trying to modify for the past several years, without much success. She said on In Depth with Francis Rose the proposals are a big step in the right direction.
Bill Lay, the State Department's chief information security officer, said his budget for cybersecurity doubled in 2014 to help address the recommendations outlined by the agency's inspector general.
The National Information Assurance Partnership, the U.S. implementation of what was supposed to be a faster, cheaper process to verify the cybersecurity of commercial IT products, turned out to be so slow and expensive that few companies could afford to go through it. But officials said they hope a recent overhaul in the procedures will breathe new life into the program.
The General Services Administration and the Homeland Security Department are putting the final touches on the next set of contracts that will truly kickstart the federal move toward dynamic cybersecurity protections of agency networks and computers. The two agencies will release six task orders under the $6 billion CDM program in the coming year to implement tools and services across more than 40 agencies.
Inside the DoD Reporter's Notebook: DoD releases missing piece of 2015 budget; defense acquisition 'good enough'
The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.
The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.
A new report from the Government Accountability Office suggests the Department of Homeland Security and the Office of Management and Budget need to take a more active role in monitoring and guiding small agencies when it comes to their security and privacy-protection programs.
Lt. Gen. Robert Ferrell, the Army's CIO/G6, said the service now is requiring all enterprise software titles to be modernized, virtualized and migrated to an approved data center.