Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity Rising
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
The Federal Drive with Tom Temin and Emily Kopp hosts a panel discussion on how industry and the government are working together on meeting their shared cybersecurity goals.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Rob Carey , Martin Dempsey , Robert Lentz , Stephen Boutelle , U.S. Cyber Command , defense industrial base , critical infrastructure , NIST , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Jared Serbu ,
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
From passing cyber legislation to training the future workforce to handle cyber threats, the federal government still has several important items on its cyber agenda.
Federal News Radio polled current and former federal cybersecurity experts for their opinion on what were the most significant accomplishments since 2006 to secure federal networks and improve public-private partnerships. The list blends suggestions of more than 10 authorities on federal cybersecurity. The accomplishments are in no particular order.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Rep. Jim Langevin (D-R.I.), co-founder of the bipartisan Congressional Cybersecurity Caucus, says the U.S. is falling short when it comes to a skilled cyber workforce capable of operating at the highest levels of its field. His column is part of Federal News Radio's special report, Cybersecurity Rising.
Rep. Mac Thornberry (R-Texas), the chairman of the House GOP Cybersecurity Task Force, argues that the country's national security cannot afford a stalemate on cyber legislation. His column is part of Federal News Radio's special report, Cybersecurity Rising.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller