Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: Critical infrastructure protection
The revised Cybersecurity Act of 2012 removes DHS from having sole oversight authority of critical infrastructure and shares the responsibility across an interagency council. The bill also would make the implementation of cyber standards by critical infrastructure operators voluntary. The legislation encourages an incentive-based program.
The Homeland Security Department showed lawmakers and staff how easy it is to create a spear phishing attack against a federal employee using free, open-source tools. The agency also said the Einstein 3 program is under development and will rely on vendors to provide intrusion prevention services. Sen. Joe Lieberman (I-Conn.) said he expects the cyber bill to go to the Senate floor for debate no later than July.
Tags: technology , cybersecurity , DHS , Mark Weatherford , Joseph Lieberman , Susan Collins , John McCain , Senate Homeland Security and Governmental Affairs Committee , Einstein 3 , Congress , Cyber bills , Jason Miller
The administration has tried to get in front of the debate over the information sharing aspects of one of the cybersecurity bills up for debate in the House Thursday. Democratic lawmakers and industry groups expressed concern over the Cyber Intelligence Sharing and Protection Act (CISPA) arguing its provisions on what information is to be shared and with whom are too broad.
A draft policy obtained by Federal News Radio details new cybersecurity requirements for more than 1,500 buildings owned by GSA's Public Building Service. GSA wants to standardize how facility control systems connect to GSA's network. The document builds on work already being done under HSPD-12.