Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cyber
House Veterans Affairs Committee members are fed up with repeated cybersecurity problems. They want the VA to improve its cybersecurity once and for all. A new bill tells the department exactly how to do it. The legislation is among the most prescriptive cyber bills that any agency has seen in almost a decade. Federal News Radio Executive Editor Jason Miller shares reactions to the bill with Federal Drive hosts Tom Temin and Emily Kopp. Read Federal News Radio's related article.
House Veterans Affairs Committee members are no longer asking the Veterans Affairs Department to improve their cybersecurity. They want to tell them how to do it. A new bill introduced Wednesday would be among the most perspective cyber bills that any agency has seen in almost a decade. Federal News Radio's Executive Editor Jason Miller was a guest on In Depth with Francis Rose. In Depth with details on the bill and reaction to it. Read Federal News Radio's related article.
GSA's cyber dashboard is starting to look a little clearer.
U.S. Cyber Command is calling for a higher seat on the military's org chart.
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.
Deltek's Ray Bjorklund and Kevin Plexico will talk about how contractors will be affected by sequestration and other issues.
November 12, 2012(Encore presentation November 26, 2012)
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.