Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cyber
February 23rd, 2011 at 11 AM
As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.
February 8th, 2011 at Noon
Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.
February 1st at 12pm
Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.
Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DOJ , McAfee , CA Technologies
January 25th, 2010 at 12:30 PM
Workers, Citizens, and Customers need easy access to their tools and teams to make quicker, higher quality decisions. They require a high level of responsiveness, agility, and data in a format they can use, i.e. Efficient, Mobile Information Transfer
Panelists will examine how we provide instant worker status, state, and preferences before you make that first contact - saving up to 1/3rd of your time. How do you help workers connect the right way the first time to speed decision making and elevate efficiency and productivity ; If you're the implementer, how do you implement presence-based mobility strategies while balancing today's communications innovation and productivity?
Self-proclaimed "technogeeks" at the Defense Advanced Research Projects Agency, after determining the nature of the cybersecurity threat, have created programs to tackle them and, most importantly they say, surprise would-be cyber crooks. Officials at DARPA say the agency's sole mission since its inception in 1958 has been to prevent technological surprises. Two of the agency's recent cybersecurity programs, called CRASH and PROCEED, were created for that purpose. CRASH - the Clean-slate Design of Resilient, Adaptive, Secure Hosts program - seeks to build new computer systems that resist cyberattacks. After successful attacks they learn from the attack, adapt and repair themselves. The program evolved from a workshop DARPA held earlier this year that pulled together experts in cybersecurity and operating-system as well as infectious-disease biologists.
December 15th, 2010
October is Cybersecurity month. Jane Norris, host of the new FedCentral program, will be joined by Karen Evans, partner at KE&T Partners, LLC, and former Administrator for E-Government and IT at OMB along with JR Reagan, principal with Deloitte & Touche LLP to discuss Cyber Workforce trends including key findings from the Human Capital Crisis in Cybersecurity study.
Dec. 14th, 10:00 am
Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.
The senate is considering a bill that would require all private sector companies to report cyber attacks.
A new report found that for 15 minutes in April a Chinese state controlled telecommunications company was able to hijack 15 percent of the world's internet traffic.