Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DHS
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.
In this week's edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz in the acquisition and IT communities that you may have missed.
Tags: technology , Digital Government Strategy , Gwynne Kostin , GSA , web analytics , USDA , Amanda Nguyen , HealthCare.gov , House Oversight and Government Reform Committee , Karen Evans , Todd Park , Steven VanRoekel , CMS , OMB , Trey Gowdy , Frank Baitman , Henry Chao , Cybersecurity , DATA Act , Federal IT Acquisition Reform Act , Congressional Budget Office , contracting , Mary Davie , Anne Rung , Inside the Reporters Notebook , Jason Miller
The Office of Management and Budget released a new memo Tuesday detailing the steps and deadlines agencies must meet to implement information-system continuous monitoring. The mandate comes on the heels of the General Services Administration and the Homeland Security Department releasing the first task order for continuous diagnostics and mitigation (CDM) tools and sensors, of which Federal News Radio has exclusive details.
Collaboration is the name of the game when it comes to many of the Homeland Security Department's cybersecurity efforts. Doug Maughan, director of DHS' Cybersecurity Division in the department's Science and Technology Directorate, discussed the department's cyber partnerships as part of the Federal News Radio special report, A New Era in Technology.
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.
The Government Accountability Office in a recent report found the requirement for agencies to report data breaches to the Homeland Security Department within one hour of discovering the incident is of little value.
GSA made the first set of awards under the continuous diagnostics and mitigation (CDM) contract.
Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.
Tags: Congress , OMB , E-Government Fund , GSA , Federal Citizen Services Fund , Gavin Baker , Center for Effective Government , Transportation , USDA , Cybersecurity , technology , A-76 , Jason Miller
Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.
Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.