Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Continuous Monitoring
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , secure identity cards , HSPD-12 , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Immigration and Customs Enforcement received a score of 95 on its FISMA report card in 2011. Jeff Eisensmith, the ICE CISO, said the agency is implementing continuous monitoring and increasing the training of its employees.
As more and more federal agencies and companies in the private sector ramp up their use of both private and public clouds, the Fed Cloud Blog thought it would be interesting to look at potential pitfalls they should try to avoid. Lucky for us, Information Week has put together a list of ways companies can [...]
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Tags: technology , management , Vivek Kundra , OMB , DoD , GSA , NASA , DHS , U.S. CERT , NIST , cybersecurity , FISMA , continuous monitoring , encryption , HSPD-12 , Cyber Workforce , CyberStat , Cyberscope , supply chain , Jason Miller
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
Tags: technology , contracting , Roger Baker , Bobbie Stempfley , Mike Krieger , Donna Dodson , Army , VA , DHS , State , NIST , GSA , cybersecurity , continuous monitoring , Cyberscope , SmartBUY , Jason Miller
Host Tom Temin talks with Jerry Davis, the chief information security officer for NASA.
July 1, 2010
More and more agencies are gearing up to deploy continuous monitoring as a means of complying with FISMA. What is it, and will it come to your agency soon?
Learn more in today's cybersecurity update.