Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: Cyber
In about 18 months a new military cyber command should be up and running. Secretary of Defense Robert Gates signed a memo yesterday instructing the U.S. Strategic Command to start the planning process. The command will coordinate the Pentagon's efforts to defend its networks and conduct cyber warfare. The new command is expected to be based at be located at Fort Meade. The decision to launch the unit verifies the growing concern about the nation's cyber vulnerabilities.
How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.
The Bulgarian government is moving to authorize widespread confiscation of illegally obtained assets. Their goal is to crackdown ion powerful organized crime and corruption.
Justice Minister Margarita Popova said the action would be a key weapon for the newly elected government, to fight crime and avoid punishment from the European Union.
Failure to demonstrate results by July next year could cut off Bulgaria's access to 11 billion Euros foreign. Bulgaria is also thought tO be a major hub of illegal cyber activity.
February 23rd, 2011 at 11 AM
As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.
February 8th, 2011 at Noon
Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.
February 1st at 12pm
Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.
Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , DHS , Lockheed Martin , DoJ , McAfee , CA Technologies
January 25th, 2010 at 12:30 PM
Workers, Citizens, and Customers need easy access to their tools and teams to make quicker, higher quality decisions. They require a high level of responsiveness, agility, and data in a format they can use, i.e. Efficient, Mobile Information Transfer
Panelists will examine how we provide instant worker status, state, and preferences before you make that first contact - saving up to 1/3rd of your time. How do you help workers connect the right way the first time to speed decision making and elevate efficiency and productivity ; If you're the implementer, how do you implement presence-based mobility strategies while balancing today's communications innovation and productivity?
Self-proclaimed "technogeeks" at the Defense Advanced Research Projects Agency, after determining the nature of the cybersecurity threat, have created programs to tackle them and, most importantly they say, surprise would-be cyber crooks. Officials at DARPA say the agency's sole mission since its inception in 1958 has been to prevent technological surprises. Two of the agency's recent cybersecurity programs, called CRASH and PROCEED, were created for that purpose. CRASH - the Clean-slate Design of Resilient, Adaptive, Secure Hosts program - seeks to build new computer systems that resist cyberattacks. After successful attacks they learn from the attack, adapt and repair themselves. The program evolved from a workshop DARPA held earlier this year that pulled together experts in cybersecurity and operating-system as well as infectious-disease biologists.
December 15th, 2010
October is Cybersecurity month. Jane Norris, host of the new FedCentral program, will be joined by Karen Evans, partner at KE&T Partners, LLC, and former Administrator for E-Government and IT at OMB along with JR Reagan, principal with Deloitte & Touche LLP to discuss Cyber Workforce trends including key findings from the Human Capital Crisis in Cybersecurity study.