bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
8:34 pm, December 18, 2014

Search Result

Search Tags:  DHS

IG report: DHS data center condolidation needs improvement

OIG of DHS makes recommendations for the department's data center consolidation initiative.

Tags: data center consolidation , technology , IG , Must Reads , Dorobek Insider

Wednesday - 10/27/2010, 04:53pm EDT

Fate of cyber bills hangs on lame-duck session

With Congress set to return for a lame-duck session after the elections, it is unclear whether lawmakers will have the time or inclination to pass a comprehensive cybersecurity bill. Some experts are calling for Congress to address at least some of the most important aspects if they can't agree on a larger bill.

Tags: technology , cybersecurity , S 3480 , Joseph Lieberman , Susan Collins , Tom Carper , Orrin Hatch , Kit Bond , Heritage Foundation , Louis Tucker , Brandon Milhorn , John Kneuer , Max Cacas

Wednesday - 10/27/2010, 07:34am EDT
Listen

To Improve Cybersecurity the Federal Government Must Enhance Its Partnership with the Private Sector

Cybersecurity is a shared responsibility. During National Cybersecurity Awareness Month, the Administration has educated the general public about the evolving risk of cyber threats through its "Stop. Think. Connect." campaign and reminded the American people, government agencies, and industry that everyone has a role to play in guarding against cyber attacks. At the same time, Administration officials have leveraged the momentum of National Cybersecurity Awareness Month to announce changes in government organizational relationships designed to enhance the security of federal information assets and networks in cyberspace, such as the Memorandum of Agreement between the U.S. Department of Defense (DoD) and the U.S. Department of Homeland Security (DHS) formalizing agency roles and responsibilities for coordinating cybersecurity. One area that has received less public attention is the need for government to enhance its partnership with the private sector.

Building this partnership and clarifying these roles and responsibilities is critical. The private sector's resources are inextricably linked to our government's efforts to successfully secure federal information in cyberspace for several key reasons, most notably:

  • Much of the nation's cyber infrastructure is owned and operated by the private sector. Because the public, government, educational institutions, and industry rely on cyberspace, an attack against a major player in the Information Technology (IT) infrastructure sector may not be just an attack against a company. Instead, it may result in an attack against the Internet itself and may impact citizens, governments, and companies across the globe. The federal cybersecurity community must clarify the degree to which government and industry should partner to prevent, detect, and defend against these challenges
  • Each key sector of the nation's Critical Infrastructure and Key Resources (CIKR) leverages cyberspace to perform mission-critical tasks.Cyberspace minimizes and, in some instances, eliminates jurisdictional, organizational, and technical boundaries of CIKR sectors (e.g., emergency services, defense industrial base, communications, government facilities, etc.). While the increased capability to share information across sectors enables private sector and government CIKR stakeholders to perform more efficiently and effectively, it also creates additional vulnerabilities in cyberspace. In order to truly be prepared to meet the challenges posed by cyber attacks that could threaten the security of multiple CIKR sectors, the federal government must enhance its partnership with private sector CIKR stakeholders
  • There is a shortage of cybersecurity talent in government. While the Cyberspace Policy Review included the need to expand and train its workforce as a key priority, and efforts are underway toward that end, the reality is…the government can't do it alone. Cyber attacks are a constantly evolving, significant threat to our national security and the federal government. In the short-term, the federal government has an immediate need for a qualified, seasoned cybersecurity workforce (e.g., Information System Security Officers (ISSO), cyber strategists, security operations specialists, and program managers, etc.) and must fill these gaps by augmenting its existing workforce with the resources available in the private sector. Long-term, the federal government must assess its broader cyber workforce strategy and the role that the private sector plays in meeting mission-critical cyber requirements
As September came to a close, DHS hosted Cyber Storm III- an exercise designed to test the government's cyber preparedness, which included participants from throughout the federal government, 11 states, 12 international partners, and 60 private sector companies. Cyber Storm III provided the opportunity to test the updated National Cyber Incident Response Plan (Interim Version, September 2010), including the roles and responsibilities of the private sector in cyber incident management. With more than 20 additional private sector participants than its preceding exercise, it also provided an unprecedented opportunity for government and the private sector to work together to solve a (fictional) cyber threat scenario. We look forward to viewing the exercise's after-action report and the recommendations for government to enhance its partnership with the private sector in the cybersecurity arena.

Tags: technology , KCG's Trusted Advisor Center , cyber , cybersecurity , DoD ,

Monday - 10/25/2010, 05:27pm EDT

ELC 2010: How to secure software

Software assurance is becoming more of a focus as agencies rely heavily on the private sector to purchase both software and hardware.

Tags: Federal Drive , ELC , software assurance , Joe Jarzombek , cybersecurity , technology

Monday - 10/25/2010, 10:15am EDT
Listen

DHS extends SBINet program

The Homeland Security Department extended the contract for its SBINet program until Nov. 17.

Tags: Jason Miller , Dorobek Insider , DHSNet , technology , contracting , Boeing

Friday - 10/22/2010, 04:45pm EDT
Listen

DHS simulates terror attack in subway systems

DHS scientists are testing how air moves in subways in D.C. and Boston in case of a bio-weapons attack.

Tags: GSO , chemical attack , terrorism , Must Reads , Dorobek Insider , subways

Friday - 10/22/2010, 03:16pm EDT

Cyber workforce cannot be a zero sum game

Agencies and industry are trading employees with specific technology skills, but in the end both need to increase the overall workforce. One expert calls for the professionalization of cybersecurity workers. Agencies are finding new ways to recruit these in-demand employees.

Tags: technology , management , Phil Reitinger , Kevin Cooley , Navy , Jim Lewis , Susan Aldridge , CSIS , University of Maryland , Deloitte , cybersecurity , cybersecurity workforce , training , Jason Miller

Friday - 10/22/2010, 07:16am EDT
Listen

Agencies struggle to recruit cyber experts

Federal News Radio's Jason Miller joined the DorobekINSIDER to discuss agencies' struggles with recruiting cyber experts.

Tags: Phil Reitinger , cybersecurity , hiring , Jason Miller , Dorobek Insider

Thursday - 10/21/2010, 06:28pm EDT
Listen

GAO: DHS needs better contractor oversight in border security project

GAO's Randolph Hite joined the DorobekINSIDER to discuss GAO's recommendations for DHS' massive border security project.

Tags: Randolph Hite , GAO , border security , management , managementg , Dorobek Insider

Thursday - 10/21/2010, 05:59pm EDT
Listen

DoD expanding domestic cyber role

Defense is quietly taking on an expanding role in defending U.S. critical infrastructure from cyber attacks.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , defense , DoD ,

Thursday - 10/21/2010, 09:30am EDT
  •  
  • 107
  •