Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: DHS
The Department of Homeland Security is putting together a report on the global response to Conficker Worm attacks, while analysts warn, the Worm is still alive and well, though probably well hidden. Atlantic Monthly columnist Mark Bowden says, botnets like the Conficker Worm are evidence that worms and viruses are now being developed by those who have intricate knowledge of cryptography, a prospect that makes defending against attacks increasingly difficult.
Federal emergency responders can expect prompt and well-rehearsed reaction from the Defense Logistics Agency when providing disaster relief during this year's hurricane season, which runs June 1 through Nov. 30. DLA's Aaron Geduldig explains.
A recent GAO report looked at agencies' policies for choosing the locations of conferences and found that cost was the number one factor when it came to planning. Details from GAO's Lorelei St. James.
Senate leaders pledge to pass a comprehensive cybersecurity bill this year. Sen. Lieberman promises a hearing and markup of the legislation before the end of June. Industry experts are concerned over the role DHS will play in regulating critical infrastructure.
Learn more in today's cybersecurity update.
Sens. Lieberman, Collins and Carper's legislation creates two new offices to oversee federal cybersecurity in DHS and the White House. It also forms a new Federal Information Security Taskforce made up of agency chief information security officers. Bill does not include "kill switch" provision for private sector networks.
Bill would put DHS in charge of all civilian networks
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
Chairman Edolphus "Ed" Towns (D-NY) is requesting detailed information from the Justice Department and DHS after the release of a Justice Department Inspector General report in 2009 that outlined major lapses at the United States National Central Bureau.
Department of Homeland Security officials say 100 percent of passengers traveling in the U.S. and its territories are now being checked against terrorist watchlists through the Transportation Security Administration's Secure Flight program - a major step in fulfilling a key 9/11 Commission recommendation. Secure Flight enables TSA to screen passengers directly against government watchlists using passenger's names, their date of birth, and gender before a boarding pass is issued. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists. Officials say 99 percent of passengers will be cleared by Secure Flight to print boarding passes at home by providing their date of birth, gender and name as it appears on the government ID they plan to use when traveling.