Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: CSIS
Frank Kendall, DoD's acting acquisition chief, said the first version fell flat due to "interest groups" weakening it. He said Congress required the strategy to detail how the military will buy offensive and defensive cyber capabilities. It's part of a broader effort to fix the Pentagon's acquisition process.
Tags: acquisition , DoD , acquisition workforce , acquisition policy , industry , Better Buying Power initiative , performance management , Alan Chvotkin , Professional Services Council , cybersecurity , jason miller , Frank Kendall
Jim Lewis, a senior fellow and director of the Technology and Public Policy Program at the Center for Strategic and International Studies, joined In Depth with Francis Rose to discuss the rising profile of cybersecurity in the Defense Department — even as officials have announced impending budget cuts.
Agencies are struggling to keep up with the tremendous amount of data being created every day. DIA deputy director David Shedd said too much information and not having the right IT to sift through it is the biggest remaining challenge the government faces. Kshemendra Paul, the program manager for the Information Sharing Environment, said tagging and standards, such as NIEM, could help solve the data deluge.
Tags: technology , management , information sharing , Kshemendra Paul , James Clapper , David Shedd , DIA , ODNI , Information Sharing Environment , WikiLeaks , NIEM , suspicious activity reporting standard , jason miller
The Senate is set to take up comprehensive cyber legislation in January that already is causing experts heartburn. Provisions to give the Homeland Security Department more authorities, including taking "any lawful action" to stop cyber attacks against systems holding federal data, are coming under fire. Industry experts are optimistic Congress will pass major cyber reform.
David Berteau, senior vice president and director of the International Security Program and Ryan Crotty, a research associate with the CSIS Defense-Industrial Initiatives Group, joined Francis Rose for Pentagon Solutions. According to their research, the effect of sequestration on the defense budget may not be as catastrophic as Pentagon leaders have conjectured.
After a decade in which it has been built up to parity with the active Army and Air Force components, the National Guard should not be allowed to backslide to a point where it is no longer usable, the National Guard chief said Friday.
The Slow Road to Cybersecurity is a comprehensive report detailing the need for securing the Internet, reducing the risks of cyber attacks, the governmental attempts at reform and how the U.S. might be heading toward a 'perfect storm'.
New report highlights need for better coordination all around
Tags: technology , management , DHS , White House , Homeland Security Subcommittee on Emerging Threats , Senate Homeland Security and Government Affairs Co , Mike McCaul , Joseph Lieberman , Susan Collins , Jim Lewis , cybersecurity , JM
The Daily Debrief gets analysis from two experts.
Learn all about it, and a criminal who hacked into 49 Congressional Web sites, in today's cybersecurity update.