Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: CSIS
The House Cybersecurity Caucus says new provisions "will establish strong, centralized oversight to protect our nation's critical information infrastructure and update our comprehensive policy for operating in cyberspace." But will they? We ask Jim Lewis with CSIS
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
FIVE events during the fall of 2009 thrust concerns over "homegrown" terrorism—or extremist violence perpetrated by U.S. legal residents and citizens—into public view. A new CSIS report examines these five cases, situating them within the context of recent U.S. efforts to address domestic radicalization.
U.S. Secretary of State Hillary Rodham Clinton said Monday Iran is sliding into a military dictatorship, a new assessment suggesting a rockier road ahead for U.S.-led efforts to stop Tehran from obtaining a nuclear weapon.
President Obama has made a top-to-bottom review of cybersecurity throughout the government a priority, and is planning on naming a cybersecurity czar. Meanwhile, Secretary of Defense Robert Gates is finalizing a plan to stand up a new military cybercommand. But what will these two new jobs really do for protecting the nation's cyber infrastructure?
Tags: defense spending , Pentagon , Department of Defense , Defense Department , defense budget , Robert Gates , John Hamre , Andrew Krepinevich , Center for Strategic & Budgetary Assessments , Center for Strategic & International Studies