Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
Pentagon wants to discourage other countries' cyber attacks by convincing them that that DoD will respond, and that the attacks will ultimately prove unsuccessful. Step one is conveying those messages more forcefully.
The Army is the latest federal organization to lay out a career path for its cybersecurity leaders. Career Field 17 will offer soldiers that career path. Advocates of professionalizing the cyber workforce believe that would feed talent pipelines with the people agencies need to succeed. Lt. Col. Sean Kern is cyberspace operations officer, and a graduate student at the Joint Advanced Warfighting School at Joint Forces Staff College at the National Defense University. On In Depth with Francis Rose, he said the main cyber problem right now is a people problem.
The leader of the Army's new Cyber Center of Excellence says his job is not merely to build the cyber workforce, but to integrate that up-and-coming capability with the Army's existing signals and intelligence disciplines.
Tags: Jared Serbu , DoD , Army , Cyber Command , cybersecurity , technology , Internet , workforce , Cyber Center of Excellence , Fort Gordon , Stephen Fogarty , cyber corps , intelligence , DISA , management , budget
Cyber operations is about the only area of the DoD budget that hasn't been subject to cuts. But the new leader of the Army's Cyber Center of Excellence says that doesn't mean the Army can grow its newest military discipline in isolation. Federal News Radio DoD reporter Jared Serbu has the details.
The Office of Personnel Management has a list of 25 different conferences that comply with federal training regulations. Dan Waddell is director of government affairs for the cybersecurity non-profit (ISC)2. OPM just added their fourth annual Security Congress event to its list of approved conferences. On In Depth with Francis Rose, Waddell explained how the event got on the list.
Nov. 15 is the deadline for the Centers for Medicare and Medicaid Services to patch up the cybersecurity holes in the Healthcare.gov website. The Government Accountability Office offered 22 technical recommendations to the agency last week. Those problems appear just as the website nears its first birthday. Raj Sharma is co-founder and CEO of the Censeo Consulting Group. On the In Depth with Francis Rose Industry Chatter segment, he shared some ways to predict, and fix, longstanding problems with large federal IT projects like Healthcare.gov.
Allen Harper, vice president and chief hacker for Tangible Security will discuss how his company is helping federal agencies with their cybersecurity challenges.
September 23, 2014
Tags: technology , Allen Harper , hacking , Tangible Security , cybersecurity , penetration testing , advanced persistent threats , zero day threats , IT security , Red Hat , grey hat , white hat , script kiddies , John Gilroy , Federal Tech Talk
The FBI will channel more people and resources into its Pittsburgh office. It's a reward for the cybersecurity team that's credited for catching five Chinese military leaders stealing trade secrets, and a Russian-based cyber crime ring that stole about $100 million from banks around the world. Michael McKeown is supervisory special agent for the Associate Division Counsel, part of the FBI Cyber Initiative and Resource Fusion Unit based in Pittsburgh. On In Depth with Francis Rose, he explained the cybersecurity effort that earned the extra resources.
Three million dollars in federal grants will go to four national mobile communications companies to figure out a way to get rid of passwords. The grants come from the Commerce Department's National Strategy for Trusted Identities in Cyberspace program, or NSTIC. The goal of NSTIC is to give consumers better security options with their mobile and online transactions. Commerce hopes that funding research to get rid of passwords will eventually minimize the risk of identity theft.