Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Navy admiral is Obama's choice to take reins of troubled NSA and US Cyber Command
An interagency review group determined having one leader for both organizations makes the most sense to get the mission done.
Obama administration considers splitting command of National Security Agency and cybersecurity
The Army still doesn't know whether its new and growing force of soldiers dedicated to cyber missions is large enough for the task. But it's certain it doesn't have the legal authorities it needs to attract and retain the talent it wants.
Command Sgt. Maj. Rodney Harris, the senior enlisted advisor at Army Cyber Command, said the Army is doing a good job at finding the right soldiers with the necessary skill sets to become cyber warriors.
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.
NSA director says surveillance programs disrupted dozens of terrorist attacks
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
U.S. Cyber Command is putting together dozens of groups to defend the military's network, to work with combatant commanders on offensive tactics and to respond to attacks against the nation. Gen. Keith Alexander, however, said budget cuts will delay DoD's ability to recruit and train team members.
Sen. Chuck Grassley (R-Iowa) is concerned new regulations may make whistleblowers even more reluctant to report tax fraud to the IRS. OMB Controller Danny Werfel says $85 billion in cuts under sequestration would hurt every state. Maj. Gen. Brett Williams says the U.S. Cyber Command is trying to figure how to normalize operations alongside air, land and sea capabilities. Lynn Singleton, director of environmental services at Lockheed Martin, talks about helping agencies move their email to the cloud. Dr. Milton Corn explains why The National Library of Medicine is monitoring social media.
The Defense Department plans to boost the ranks of cybersecurity professionals, increasing cyber staff at U.S. Cyber Command by more than five times to some 4,900 employees. But DoD's plan is daunting in more ways than one. The job qualifications and skills needed for the kinds of positions the Pentagon wants are rare and often require years of training and hands-on experience. And even if DoD looks outside the confines of the Pentagon to fill these roles, it's not entirely clear where the new cyber pros would come from.
An Iranian semi-official news agency says there has been another cyberattack by the sophisticated computer worm Stuxnet, this time on the industries in the country's south.
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S. Cyber Command.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
A draft executive order directs U.S. spy agencies to share the latest intelligence about cyberthreats with the companies operating electric grids, water plants, railroads and other vital industries in order to protect them from electronic attacks.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command