Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: CA Technologies
For government agencies already striving to do more with less, demands to improve customer service present a complex challenge to staff, systems, and technology which may already be pressed to the limit. In addition to federal mandates, such as President Obama's Executive Order 13571 to streamline service delivery and to improve customer service, many citizens now expect to interact with government using new self-service, web-based interfaces, which can be difficult to support on the aging technological infrastructures in many government agencies. And in times of economic downturn, citizens' need for responsive government services rise sharply as pressure on agencies' customer service operations increase—from the top down and the grassroots up.
February 1st at 12pm
Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.
Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DOJ , McAfee ,
September 22nd at 11 AM
Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure.
This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.
September 14th at 12PM
Program will discuss the progress report on information & intelligence sharing programs, key initiatives ongoing to improve secure information sharing, identifying what type of information needs to be shared, how fusion centers are key to reaching out to the private sector, and a vision for the future for secure information and intelligence sharing.
Tags: technology , Federal Executive Forum , Bart Johnson , DHS , David Wennergren , Theresa Hadden , fairfax county , Timothy Brown , Sam Chun , HP , Allan Thompson , Dataguise , Jim Flyzik , Trezza , Flyzik Group
New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.
The cyber threat landscape has changed dramatically in recent years. Experts believe that more threats than ever are not coming from other countries, or malicious hackers - but from within the network!The U.S. National Counterintelligence Strategy says that insiders are targeting networks to intercept information, or disrupt operations. Khalid Kark of Forrester Research says agencies have to manage people, the process, and technological controls. Continuous monitoring is the new buzzword.
DARPA is one agency that recognizes cyber threats are just as likely to come from within the network. The agency has posted a solicitation on Fed Biz Ops looking for what they call novel approaches to insider threat detection. The Defense Advanced Research Agency is looking for a way to increase the accuracy, rate and speed of detection. The Cyber Insider Threat (CINDER) program will stop adversaries from operating within government and military networks before they can get access.
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.