bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
7:55 pm, December 17, 2014

Search Result

Search Tags:  Cyber

The Accidental Insider Threat: Is Your Organization Ready?

Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?

Tags: Raynor Dahlquist , Tom Kellermann , Angela McKay , Michael C. Theis , technology , Booz Allen , Booz Allen Expert Voices , cyber , cybersecurity

Tuesday - 09/25/2012, 05:50pm EDT
Listen

Cyber Security: Achieving Cyber Resilience

Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.

Tags: technology , Accenture , cyber , cyber security , IT , DoD , cyber crime , ISS , FAA , DHS , Army , CERT , Steven D. Shirley , Michael F. Brown , Army BG Steven W. Smith , Randy Vickers

Wednesday - 01/27/2010, 02:21pm EST
Listen

Link between usability and security

If the lock to your house required special training to work, you'd be more likely to take your chances and leave the place unlocked. That's how it is with cyber security. If security procedures and systems are too complicated, users tend to skip them. But research at the National Institute of Standards and Technology is establishing a link between usability and security and will make the results available this summer to federal agencies.

Tags: technology , cyber , security

Thursday - 05/07/2009, 09:30pm EDT

Missing- terabyte of personally identifiable information.

Uh oh. It's happened again. A hard drive containing a terabyte of personally identifiable information has gone missing. It disappeared from a lab desk inside the National Archives in College Park, Maryland. The disk housed social security numbers of Clinton White House visitors and of the Gore family. Once again proving that the insider threat is as potent as any attack launched from overseas. I'm Tom Temin.

Tags: management , cyber , security , Clinton , Gore , SSN

Thursday - 05/21/2009, 02:03pm EDT

Bill would trade time served for education in cybersecurity

The Cybersecurity Enhancement Act is making its way through the House.

Tags: technology , cyber , cybersecurity

Thursday - 02/04/2010, 04:46pm EST

CyberSecurity-"Progress & Best Practices"

Program discusses the progress on CyberSecurity with the DHS-DoD & ODNI.

Tags: technology , Federal Executive Forum , cyber security , DHS , DoD , ODNI , cyber , security , Greg Schaffer , Dave Wennergren , Priscilla Guthrie , Lee Holcomb , Robert Dix , Tom Conway , McAfee , Juniper Networks

Tuesday - 01/12/2010, 03:18pm EST

Cyber: Coming of Age show

October 5th, 2011
How far have we come and what are our biggest challenges—and opportunities—ahead as Cybersecurity comes of age? Hear what Lt. General Harry Raduege. Jr. and Karen Evans have to say about this compelling discussion.

Tags: management , FedCentral , Karen Evans , Harry Raduege , cybersecurity , cyber , Deloitte , OMB

Monday - 10/03/2011, 04:46pm EDT
Listen

Cyber Command

In about 18 months a new military cyber command should be up and running. Secretary of Defense Robert Gates signed a memo yesterday instructing the U.S. Strategic Command to start the planning process. The command will coordinate the Pentagon's efforts to defend its networks and conduct cyber warfare. The new command is expected to be based at be located at Fort Meade. The decision to launch the unit verifies the growing concern about the nation's cyber vulnerabilities.

Tags: technology , Pentagon , cyber , Robert Gates , Fort Meade

Tuesday - 06/23/2009, 07:23pm EDT
  •  
  • 2
  •