bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:00 pm, November 27, 2014

Search Result

Search Tags:  CA Technologies

DoJ files False Claims Act lawsuit against CA Technologies

The Justice Department alleges CA has violated since 2002 terms of its GSA schedules contract and over-charged the government for IT hardware and software.

Tags: contracting , industry , Justice Department , GSA , Larry Allen , Allen Federal Business Partners , Roger Waldron , Coalition for Government Procurement , False Claims Act , oversight , Jason Miller

Thursday - 05/29/2014, 05:38pm EDT

Insider threat programs must find the right 'trust but verify' balance

NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.

Tags: management , insider threat , Beth Cobert , OMB , John Fitzpatrick , NARA , information sharing , Patrick Kennedy , State Department , NSA , Keith Alexander , Ed Hammersla , Raytheon , Bill Harrod , Intelligence National Security Alliance , Dawn Cappelli , Rockwell Automation , Trust Redefined: Reconnecting Government and its Employees , Jason Miller

Wednesday - 05/21/2014, 03:56am EDT
Listen

Accelerate and Streamline for Better Customer Service

For government agencies already striving to do more with less, demands to improve customer service present a complex challenge to staff, systems, and technology which may already be pressed to the limit. In addition to federal mandates, such as President Obama's Executive Order 13571 to streamline service delivery and to improve customer service, many citizens now expect to interact with government using new self-service, web-based interfaces, which can be difficult to support on the aging technological infrastructures in many government agencies. And in times of economic downturn, citizens' need for responsive government services rise sharply as pressure on agencies' customer service operations increase—from the top down and the grassroots up.

Tags: technology , Carolyn Colvin , Seth D. Harris , Mariela Merelo , Bill Clark , Tom Temin

Monday - 08/20/2012, 11:32am EDT
Listen

CyberSecurity - "Progress & Best Practices"

February 1st at 12pm

Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.

Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DoJ , McAfee ,

Monday - 01/17/2011, 03:31pm EST

Identity Aware Loss Prevention: How to Manage and Protect Sensitive Information

September 22nd at 11 AM

Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure.

This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.

Tags: technology , Dynamic Cybersecurity , cybersecurity , Gijo Mathew , security , Peter Gouldmann , NIST , CNSS , Brian P. Burns , Pentagon , Airforce , Simon Szykman

Tuesday - 09/07/2010, 04:02pm EDT
Listen

Secure Information and Intelligence Sharing

September 14th at 12PM

Program will discuss the progress report on information & intelligence sharing programs, key initiatives ongoing to improve secure information sharing, identifying what type of information needs to be shared, how fusion centers are key to reaching out to the private sector, and a vision for the future for secure information and intelligence sharing.

Tags: technology , Federal Executive Forum , Bart Johnson , DHS , David Wennergren , Theresa Hadden , fairfax county , Timothy Brown , Sam Chun , HP , Allan Thompson , Dataguise , Jim Flyzik , Trezza , Flyzik Group

Tuesday - 09/07/2010, 02:04pm EDT

Network-centric tools help guard against internal threats

New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.

Tags: technology , Inside Cybersecurity , cybersecurity , Khalid Kark , Forrester Research , Amy Morris

Thursday - 09/02/2010, 03:57pm EDT

Is your agency under attack from within?

The cyber threat landscape has changed dramatically in recent years. Experts believe that more threats than ever are not coming from other countries, or malicious hackers - but from within the network!The U.S. National Counterintelligence Strategy says that insiders are targeting networks to intercept information, or disrupt operations. Khalid Kark of Forrester Research says agencies have to manage people, the process, and technological controls. Continuous monitoring is the new buzzword.

Tags: technology , Inside Cybersecurity , cybersecurity , Amy Morris

Thursday - 09/02/2010, 03:52pm EDT

DARPA wants to stop inside cyberthreat before it starts

DARPA is one agency that recognizes cyber threats are just as likely to come from within the network. The agency has posted a solicitation on Fed Biz Ops looking for what they call novel approaches to insider threat detection. The Defense Advanced Research Agency is looking for a way to increase the accuracy, rate and speed of detection. The Cyber Insider Threat (CINDER) program will stop adversaries from operating within government and military networks before they can get access.

Tags: technology , Inside Cybersecurity , CINDER , cybersecurity , DARPA , FBO , Amy Morris

Thursday - 09/02/2010, 03:50pm EDT
  • 1
  •