Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: CERT
Jeff Alderdice and Dave Smith from Northstar Global Response join host Derrick Dortch to talk about their plans to train emergency responders in other countries.
July 20, 2012
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.
First federal-state partnership regarding cybersecurity.
A newly release updates recommendations for how to certify and accredit computer systems as secure.
China denied involvement in Internet attacks and defended its online restrictions as lawful Monday after the United States urged Beijing to investigate a computer attack against search engine giant Google.
Employees with access to company servers via a Web-browser,could be exposed to man-in-the-middle attacks, according to an advisory issued by the U.S. Computer Emergency Readiness Team
Dawn Cappelli, technical manager of the enterprise threat and vulnerability teams at CERT, explains why insider threats are viewed are costing organizations more money.
Federal Security Spotlight talks with Marita Fowler, section chief of the surface analysis group at U.S. CERT, about recent trends in cyber attacks.
January 20, 2011
Sri Lanka Information Communication Technology Agency (ICTA) has launched a national CERT (Computer Emergency Response Team) to act as the focal point for Cyber security for the nation.