Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cyber
Program discusses the progress on CyberSecurity with the DHS-DoD & ODNI.
Tags: technology , Federal Executive Forum , cyber security , DHS , DoD , ODNI , cyber , security , Greg Schaffer , Dave Wennergren , Priscilla Guthrie , Lee Holcomb , Robert Dix , Tom Conway , McAfee , Juniper Networks
Tags: technology , Federal Executive Forum , cyber security , DHS , DoD , FAA , cyber , security , Robert Lentz , Greg Schaffer , Dave Bowen , Fred Newberry , Cisco , John Bordwine , Symantec , Sam Chun , EDS , Jim Flyzik , Flyzik Group
October 5th, 2011
How far have we come and what are our biggest challenges—and opportunities—ahead as Cybersecurity comes of age? Hear what Lt. General Harry Raduege. Jr. and Karen Evans have to say about this compelling discussion.
In about 18 months a new military cyber command should be up and running. Secretary of Defense Robert Gates signed a memo yesterday instructing the U.S. Strategic Command to start the planning process. The command will coordinate the Pentagon's efforts to defend its networks and conduct cyber warfare. The new command is expected to be based at be located at Fort Meade. The decision to launch the unit verifies the growing concern about the nation's cyber vulnerabilities.
How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.
The Bulgarian government is moving to authorize widespread confiscation of illegally obtained assets. Their goal is to crackdown ion powerful organized crime and corruption.
Justice Minister Margarita Popova said the action would be a key weapon for the newly elected government, to fight crime and avoid punishment from the European Union.
Failure to demonstrate results by July next year could cut off Bulgaria's access to 11 billion Euros foreign. Bulgaria is also thought tO be a major hub of illegal cyber activity.
February 23rd, 2011 at 11 AM
As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.
February 8th, 2011 at Noon
Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.
February 1st at 12pm
Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.
Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , Cybersecurity , cyber , DHS , Lockheed Martin , DoJ , McAfee , CA Technologies