bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
11:17 am, October 25, 2014

Search Result

Search Tags:  Cybersecurity

Maj. Gen. Dale Meyerrose, Air Force (Ret.), Meyerrose Group

A computer hacker facing up to 20 years in prison is free after helping the federal government stop hundreds of cyberattacks. He taught agencies how to protect millions of dollars and cripple the hacker group Anonymous. Retired Air Force Maj. Gen. Dale Meyerrose was chief information officer for three Air Force commands and three joint combatant commands. He was also the first CIO of the Office of the Director of National Intelligence and is now president of the Meyerrose Group. He joined In Depth with Francis Rose to explain what kind of precedence this sets for future cybersecurity policies.

Tags: Dale Meyerrose , Air Force , cybersecurity , hacking , Meyerrose Group , DoD , In Depth

Monday - 06/02/2014, 05:24pm EDT
Listen

Jason Miller, Executive Editor, Federal News Radio

Rob Carey spent 31 years in federal technology, but his "wow" moment came toward the end of his tenure. Carey recently retired from the Defense Department, becoming at least the ninth senior technology official to leave government since November. Carey is the former principal deputy CIO at the Defense Department and now is the vice president and general manager for cybersecurity at CSC. He tells executive editor Jason Miller on Ask the CIO about the moment when he knew technology had changed government. Listen to the full show.

Tags: Jason Miller , Ask the CIO , Rob Carey , cybersecurity

Monday - 06/02/2014, 10:29am EDT
Listen

IG concludes VA's systems, data remain at risk

The 2013 FISMA report to Congress shows the Veterans Affairs Department continues to struggle with cybersecurity and has more than 6,000 items on its plans of actions and milestones and continued weaknesses in access and configuration management controls. VA CIO Stephen Warren details several initiatives to address many of the 35 recommendations.

Tags: technology , cybersecurity , Veterans Affairs , oversight , FISMA , Congress , Stephen Warren , VA Cyber Efforts in the Hot Seat , Jason Miller

Friday - 05/30/2014, 04:11am EDT

U.S. Cyber Command wants DISA to take greater role in DoD cyber defense

Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.

Tags: DoD , DISA , U.S. Cyber Command , Michael Rogers , Edward Cardon , AFCEA , workforce , cybersecurity , management , Jared Serbu

Thursday - 05/29/2014, 03:46am EDT
Listen

Former DoD deputy CIO Carey sees future of cyber in identity, data

Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.

Tags: technology , Rob Carey , DoD , CSC , cybersecurity , mobility , Ask the CIO , Jason Miller

Thursday - 05/29/2014, 11:36am EDT
Listen

DHS striving to avoid 'tragic mistake' under cyber program

Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.

Tags: technology , cybersecurity , DHS , Jason Miller , Alan Paller , SANS Institute , continuous diagnostics and mitigation , AFCEA , John Streufert

Thursday - 05/29/2014, 04:30am EDT
Listen

Richard Stiennon, Security Analyst, IT Harvest

You are the key to stopping an insider threat and preventing a cyber incident at your agency even if you don't work in the IT department. Richard Stiennon is the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. He says there are two categories of insider threats and identifying the most dangerous kind depends on you.

Tags: Richard Stiennon , IT Harvest , cybersecurity , technology , In Depth

Wednesday - 05/28/2014, 05:59pm EDT
Listen

DoD finalizing tech specs for Joint Information Environment

DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.

Tags: DoD , technology , cybersecurity , Joint Information Environment , Joint Staff , Defense Information Systems Agency , Mark Bowman , Brian Dravis , David Stickley , Jared Serbu

Tuesday - 05/27/2014, 04:40am EDT
Listen

Dan Waddell, Director of Government Affairs, (ISC)2

Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.

Tags: technology , cybersecurity , Dan Waddell , (ISC)2 , Federal Drive , Tom Temin , Emily Kopp

Friday - 05/23/2014, 09:54am EDT
Listen

GSA's Office of Government-wide Policy focused on identity security, cybersecurity

GSA Office of Government-wide Policy Chief of Staff Stephanie Rivera discusses efforts to create a standardized operating process for all agencies, and the challenges and opportunities that go along with it.

Tags: Agency of the Month , GSA , Stephanie Rivera , technology , IT , cybersecurity , security , Office of Government-wide Policy , Jason Fornicola , best practices

Thursday - 05/22/2014, 02:02pm EDT
  •  
  • 11
  •