Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cyber Command
The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
Tags: acquisition , Fannie Mae, Freddie Mac , qualified mortgage rule , dodd-frank act , Consumer Financial Protection Bureau , Base Realignment and Closure , Fort Meade , NSA , DISA , lobbying , Allen Scott , Nela Richardson , Peter Crispino , The Arundel Voice , Peter Brusoe , Bloomberg Government , Capital Impact
Federal News Radio polled current and former federal cybersecurity experts for their opinion on what were the most significant accomplishments since 2006 to secure federal networks and improve public-private partnerships. The list blends suggestions of more than 10 authorities on federal cybersecurity. The accomplishments are in no particular order.
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Gen. Keith Alexander, commander of the U.S. Cyber Command, told lawmakers DoD would complete an updated version of rules of engagement for cyberspace in the next month or two. Some congressmen believe the Pentagon needs broader authorities to protect the nation from cyber attacks.
The DoD Cyber Command poked and prodded the Army Corps' Los Angeles district's network during a recent Command Cyber Readiness Inspection. Army Corps of Engineers CIO Bob Kazimer said the analysis will give the rest of the agency lessons learned to improve cybersecurity across the Corps.
December 15, 2011
A week of simulated cyber battling took place at Nellis Air Force Base just outside Las Vegas.
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.