7:40 am, May 25, 2015

Search Result

Search Tags:  Cyber

Cyber Command

In about 18 months a new military cyber command should be up and running. Secretary of Defense Robert Gates signed a memo yesterday instructing the U.S. Strategic Command to start the planning process. The command will coordinate the Pentagon's efforts to defend its networks and conduct cyber warfare. The new command is expected to be based at be located at Fort Meade. The decision to launch the unit verifies the growing concern about the nation's cyber vulnerabilities.

Tags: Technology , Pentagon , cyber , Robert Gates , Fort Meade

Tuesday - 06/23/2009, 07:23pm EDT


How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.

Tags: Pentagon , cyber , Obama , hackers

Wednesday - 04/22/2009, 11:57am EDT


The Bulgarian government is moving to authorize widespread confiscation of illegally obtained assets. Their goal is to crackdown ion powerful organized crime and corruption.

Justice Minister Margarita Popova said the action would be a key weapon for the newly elected government, to fight crime and avoid punishment from the European Union.

Failure to demonstrate results by July next year could cut off Bulgaria's access to 11 billion Euros foreign. Bulgaria is also thought tO be a major hub of illegal cyber activity.

Tags: Technology , Pentagon , Bulgaria , crime , corruption , cyber

Thursday - 11/12/2009, 10:18am EST

Pentagon Cyber

Tags: Pentagon , cyber

Tuesday - 04/07/2009, 05:19pm EDT

Cyber Hire: Ramping Up the Cyber Workforce

February 23rd, 2011 at 11 AM

As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.

Tags: Technology , Booz Allen Distinguished Speaker Series , cyber

Friday - 02/18/2011, 12:42pm EST

Advanced Persistent Threat: Industrial Strength Hacking

February 8th, 2011 at Noon

Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.

Tags: Technology , Booz Allen Distinguished Speaker Series , cyber , Gary McGraw , Anup Ghosh , Larry Clinton , Jeffrey Carr , Bill Stewart

Wednesday - 02/02/2011, 12:56pm EST

CyberSecurity - "Progress & Best Practices"

February 1st at 12pm

Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.

Tags: Technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DoJ , McAfee , CA Technologies

Monday - 01/17/2011, 03:31pm EST


January 25th, 2010 at 12:30 PM

Workers, Citizens, and Customers need easy access to their tools and teams to make quicker, higher quality decisions. They require a high level of responsiveness, agility, and data in a format they can use, i.e. Efficient, Mobile Information Transfer

Panelists will examine how we provide instant worker status, state, and preferences before you make that first contact - saving up to 1/3rd of your time. How do you help workers connect the right way the first time to speed decision making and elevate efficiency and productivity ; If you're the implementer, how do you implement presence-based mobility strategies while balancing today's communications innovation and productivity?

Tags: Technology , collaboration , Future of Public Sector Workforce and Workspace Su , FAS , GSA , DoD , Robert Carey , Casey Coleman , Navy , cyber , Chad Tompkins

Monday - 01/17/2011, 01:25pm EST

Programs Determine the Nature of Cyber-threats

Self-proclaimed "technogeeks" at the Defense Advanced Research Projects Agency, after determining the nature of the cybersecurity threat, have created programs to tackle them and, most importantly they say, surprise would-be cyber crooks. Officials at DARPA say the agency's sole mission since its inception in 1958 has been to prevent technological surprises. Two of the agency's recent cybersecurity programs, called CRASH and PROCEED, were created for that purpose. CRASH - the Clean-slate Design of Resilient, Adaptive, Secure Hosts program - seeks to build new computer systems that resist cyberattacks. After successful attacks they learn from the attack, adapt and repair themselves. The program evolved from a workshop DARPA held earlier this year that pulled together experts in cybersecurity and operating-system as well as infectious-disease biologists.

Tags: Technology , Meeting Mission and Goals through Technology , Scott Carr , DARPA , cyber

Monday - 12/27/2010, 11:11am EST

The Human Capital Crisis in Cybersecurity

December 15th, 2010

October is Cybersecurity month. Jane Norris, host of the new FedCentral program, will be joined by Karen Evans, partner at KE&T Partners, LLC, and former Administrator for E-Government and IT at OMB along with JR Reagan, principal with Deloitte & Touche LLP to discuss Cyber Workforce trends including key findings from the Human Capital Crisis in Cybersecurity study.

Tags: management , FedCentral , Deloitte , Karen Evans , cyber , USCC

Wednesday - 12/15/2010, 02:38pm EST
  • 3