Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Center for Democracy and Technology
White House cybersecurity coordinator Howard Schmidt says his office will focus on privacy as much as it will focus on cybersecurity. He says the government can't have security without privacy. Experts say they are pleased with Schmidt's initial ideas, but wonder where the privacy oversight board is.
Good government group weighs in ahead of cybersecurity report release.
A good government group grades the Obama Administration on open government.
The Office of Personnel Management has released updated security notices for its new Federal Employees Health Benefits program database.
The Cybersecurity, Innovation and the Internet Economy report charges the Commerce Department with bringing together non-critical infrastructure businesses to improve the security of their computers and systems. This is the fourth cybersecurity strategy or proposal from the administration since April. Commerce will act as a convener to help create voluntary standards.
Instead of imposing additional security regulations, the U.S. government must work with the private sector to develop incentives that motivate companies to voluntarily adopt security best practices.
Instead of government mandates, industry groups are calling for government incentives to spur better cybersecurity practices.
If you want effective cybersecurity, you need a policy that embraces voluntary public/private partnerships.
A Congressional subcommittee heard testimony from three cybersecurity experts Friday who said the Defense Department should share more information on cyber threats with private network operators. The hearing, which examined DoD's role in the nation's cyber defense, produced a consensus that the country needs to do more to protect itself from cyber threats, the subcommittee's chairman said.
Tags: DoD , DHS , Congress , cybersecurity , Institute for Information Infrastructure Protectio , Dartmouth College , North American Electric Reliability Corporation , Gregory Nojeim , Gerry Cauley , Shari Pfleeger , Jared Serbu , DoD Report
The Office of Personnel Management's plan to build a data system with millions of American's health care claims is raising concerns about privacy.