Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
The cyber attacks on small federal agencies demonstrate the cyber domain is an ecosystem, and the federal government is one of many different cyber cultures. One expert says a map of the different cultures can help agencies prevent cyber attacks. Ben Fitzgerald is senior fellow and director of the Technology and National Security Program at the Center for a New American Security. He explained that and other cybersecurity strategies on In Depth with Francis Rose.
The National Association of Corporate Directors' (NACD) Handbook on Cyber-Risk Oversight, introduced Tuesday at the National Press Club in Washington, outlines five key principles that aim to move forward the collaborative cybersecurity effort.
Inside the Reporter's Notebook: Category management launches five pilots; more vendor past performance data
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Tags: Inside the Reporters Notebook , Jason Miller , Defense Intelligence Agency , DoE , Commerce , Mike Maraya , cybersecurity , Rod Turk , Grant Schneider , Sydney Smith-Heimbrock , Marie Davie , Marty Jennings , Tom Sharpe , Dick Ginman , Alan Chvotkin , GSA , OFPP , category management , Lesley Field , Past performance , technology , people , acquisition , Professional Services Council
The National Security Agency's top lawyer says the Edward Snowden disclosures not only hurt U.S. intelligence gathering capabilities - they may have also damaged the chance of Congress successfully passing cybersecurity legislation anytime in the near future.
By some estimates, taking out just nine critical electrical substations could plunge the whole nation into darkness. Threats to the electrical grid aren't just from cybersecurity, but also from a lack of physical security. The Federal Energy Regulatory Commission asked the Battelle Memorial Institute to look into security of the bulk electricity system. Jason Black is the research leader at Battelle. He joined Tom Temin and Emily Kopp on the Federal Drive to talk about his findings.
Cyber criminals are adjusting so quickly that it's become an 'arms race' between them and agency technology officers trying to guard against threats. During a recent Federal News Radio panel discussion, officials shared expertise and tactics for protection.
The Justice Department is asking Congress for more resources to fight cybercrime. Yesterday, a top official told Senators cyber criminals are becoming so sophisticated that the department, and the FBI in particular, are adapting their tactics and tools on a minute-by-minute basis. That might not be fast enough. The FBI estimates 500 million computers are infected by botnets each year, meaning that there are 18 victims per second. Levi Gundert is a former secret service agent and now a technical lead with Cisco's Threat Research, Analysis and Communications team. He told Emily Kopp on the Federal Drive that the government deserves credit for building partnerships that can track and find cyber criminals.
Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
July 14, 2014
Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.