bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
12:23 pm, October 21, 2014

Search Result

Search Tags:  Cyber

Pentagon Cyber

Tags: Pentagon , cyber

Tuesday - 04/07/2009, 05:19pm EDT

Cyber Hire: Ramping Up the Cyber Workforce

February 23rd, 2011 at 11 AM

As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.

Tags: technology , Booz Allen Distinguished Speaker Series , cyber

Friday - 02/18/2011, 12:42pm EST
Listen

Advanced Persistent Threat: Industrial Strength Hacking

February 8th, 2011 at Noon

Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.

Tags: technology , Booz Allen Distinguished Speaker Series , cyber , Gary McGraw , Anup Ghosh , Larry Clinton , Jeffrey Carr , Bill Stewart

Wednesday - 02/02/2011, 12:56pm EST
Listen

CyberSecurity - "Progress & Best Practices"

February 1st at 12pm

Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.

Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DoJ , McAfee , CA Technologies

Monday - 01/17/2011, 03:31pm EST

Mobility

January 25th, 2010 at 12:30 PM

Workers, Citizens, and Customers need easy access to their tools and teams to make quicker, higher quality decisions. They require a high level of responsiveness, agility, and data in a format they can use, i.e. Efficient, Mobile Information Transfer

Panelists will examine how we provide instant worker status, state, and preferences before you make that first contact - saving up to 1/3rd of your time. How do you help workers connect the right way the first time to speed decision making and elevate efficiency and productivity ; If you're the implementer, how do you implement presence-based mobility strategies while balancing today's communications innovation and productivity?

Tags: technology , collaboration , Future of Public Sector Workforce and Workspace Su , FAS , GSA , DoD , Robert Carey , Casey Coleman , Navy , cyber , Chad Tompkins

Monday - 01/17/2011, 01:25pm EST
Listen

Programs Determine the Nature of Cyber-threats

Self-proclaimed "technogeeks" at the Defense Advanced Research Projects Agency, after determining the nature of the cybersecurity threat, have created programs to tackle them and, most importantly they say, surprise would-be cyber crooks. Officials at DARPA say the agency's sole mission since its inception in 1958 has been to prevent technological surprises. Two of the agency's recent cybersecurity programs, called CRASH and PROCEED, were created for that purpose. CRASH - the Clean-slate Design of Resilient, Adaptive, Secure Hosts program - seeks to build new computer systems that resist cyberattacks. After successful attacks they learn from the attack, adapt and repair themselves. The program evolved from a workshop DARPA held earlier this year that pulled together experts in cybersecurity and operating-system as well as infectious-disease biologists.

Tags: technology , Meeting Mission and Goals through Technology , Scott Carr , DARPA , cyber

Monday - 12/27/2010, 11:11am EST

The Human Capital Crisis in Cybersecurity

December 15th, 2010

October is Cybersecurity month. Jane Norris, host of the new FedCentral program, will be joined by Karen Evans, partner at KE&T Partners, LLC, and former Administrator for E-Government and IT at OMB along with JR Reagan, principal with Deloitte & Touche LLP to discuss Cyber Workforce trends including key findings from the Human Capital Crisis in Cybersecurity study.

Tags: management , FedCentral , Deloitte , Karen Evans , cyber , USCC

Wednesday - 12/15/2010, 02:38pm EST
Listen

Why is CyberSecurity so Hard?

Dec. 14th, 10:00 am

Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.

Tags: technology , Center for Innovation in Government , cyber , cybersecurity , security , Unisys , Mark Cohn , Anthony Valletta , Amit Yoran , Andre Eaddy

Wednesday - 12/08/2010, 05:06pm EST
Listen

Bill to require private sector reporting of cyber attacks

The senate is considering a bill that would require all private sector companies to report cyber attacks.

Tags: cyber , cybersecurity , Cybersecurity Update , botnet , cyber attack , Stuxnet , Stuxnet wormm , legislation , Senate Homeland Security and Governmental Affairs , homeland security , Nextgov

Thursday - 11/18/2010, 05:19pm EST

Report confirms China hijack of Internet

A new report found that for 15 minutes in April a Chinese state controlled telecommunications company was able to hijack 15 percent of the world's internet traffic.

Tags: China , hacking , Internet , data theft , U.S.-China Economic and Security Review Commission , Dorobek Insider , cyber , cybersecurity

Wednesday - 11/17/2010, 03:05pm EST
  •  
  • 3
  •