Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DHS
An employee who runs a racist website predicting and advocating a race war has been put on paid administrative leave. His website criticizes whites, gays, those of mixed race, and blacks who integrate with whites.
The Defense chief information officer is expected to update one directive to expand the number and type of devices that must meet the military's cybersecurity requirements. The Pentagon also will issue a second revised directive to move DoD closer to civilian agencies around risk management of IT systems.
Eight cutting-edge technologies developed by the government are being shown off this week to venture capitalists and investors in Silicon Valley, with the hope of attracting someone to take the applications to market.
Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.
DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.
Federal officials say the budget environment — with or without sequestration — is leading agencies to come to grips with the idea that no matter how much they cut, no matter how much they work to become more efficient, they still will not have enough people or money to get everything done. The goal is to install discipline and data into the decision making process.
Customs and Border Protection's P-3 aircraft are important parts of the agency's work along the southern border of the United States to stop drugs coming into the country.
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.
The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.