Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Dianne Feinstein
Sen. Dianne Feinstein (D-Calif.), chairwoman of the Senate Intelligence Committee says she expects the panel to vote later this week on the nomination of John Brennan to be director of the CIA.
The Select Committee on Intelligence member wrote a letter to White House Cyber Coordinator Michael Daniel asking him to make sure any mandate doesn't harm the networks used for interactive computer services.
The pressing need for cybersecurity legislation has led to widely divergent paths in the House and Senate. The House has opted for a more incremental approach, while the Senate has crafted comprehensive legislation
Tags: cybersecurity , Harry Reid , Darrell Issa , John McCain , Mike Rogers , Dan Lungren , NSA , DHS , House Homeland Security Intelligence Committee , Joseph Lieberman , Jay Rockefeller , Susan Collins , Michael McCaul , NSF , Elijah Cummings , Congress , House , Senate
WFED's Jason Miller has details; plus a preview of tomorrow's Federal Security Spotlight
Former director McConnell wishes he spent more time on it
Sen. Feinstein calls for an international treaty on cyberspace to create mutual assurances of protection. Experts say the difficulty is determining the threshold of what constitutes an attack worthy of war. Delayed DoD cyber command would play key role in coming up with strategy for offensive and defensive cyber actions.