Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DoD
The remains of two servicemen, missing in action from World War II, including one from Maryland were laid to rest yesterday. Army Air Forces Staff Sgts. Claude G. Tyler of Landover, Md. and Claude A. Ray of Coffeyville, Kan were both 24. Tyler was buried at Arlington National Cemetery, and Ray was buried in Fallbrook, Calif. They took off from an airfield near New Guinea on Oct. 27, 1943. They were to land near the Bismarck Sea, but the craft was lost. In August 2003 a Defense Department team received information on a crash site from a citizen in Papua New Guinea. That led to the identification of Tyler and Ray.
The service has reached an important first milestone in its effort to achieve a key energy conservation goal with last week's test of the first experimental ship to operate using algae-based bio-diesel fuel.
Bruce McConnell, Senior Counselor at the Department of Homeland Security's National Protection and Programs Directorate, joined the DorobekINSIDER to explain why the partnership between DHS and DoD are necessary and how that agreement will work.
USMC recruiters in Chantilly discovered in the early morning hours yesterday that their office had been hit by gunfire overnight while the building was being renovated. The recruiters had been working out of their Sterling, Virginia office. This was the third military facility that had been shot at in the same two week time frame. The Pentagon and the Marine Corp Museum had been hit by gunfire from the same weapon. Authorities in an Illinois suburb are also looking into the stabbing of a Marine recruiter that happened within that time period.
Seymour Hersh writes in the New Yorker about the EP-3E debacle that has fueled a debate on whether the military or civilians should take the lead in cybersecurity.
In a town that has become accustom to long and tangled appointments, this one may go down in the books, but it is officially official this morning: Defense Secretary Robert Gates named Teri Takai to be the Defense Departmentâ€™s chief information officer, ostensibly replacing John Grimes, who retired in April 2009. Takai will start her [...]
In a town that has become accustom to long and tangled appointments, this one may go down in the books, but it is officially official this morning: Defense Secretary Robert Gates named Teri Takai to be the Defense Departmentâ€™s chief information officer, ostensibly replacing John Grimes, who retired in April 2009. Takai is widely respected [...]
Did the cancellation of joint military exercises between the U.S. and S. Korea in the Yellow Sea have anything to do with China. Not according to the Pentagon. A spokesman said the two navies couldn't agree on a timetable. He also said the exercises in international water should pose no problems for neither China nor North Korea The South Korean media reported the drills had been cancelled because of complaints from China.
A team of experts has been pouring over the latest release of documents from wiki leaks. Pentagon spokesman Dave Lapan said they didn't reveal anything that hadn't already been reported. Most of the material dealt with tactical intelligence and unit level reporting of events and incidents that took place during the Iraq War. What the Pentagon has said is that Iraqis whose names that do appear in the documents are understandably at risk.
To Improve Cybersecurity the Federal Government Must Enhance Its Partnership with the Private Sector
Cybersecurity is a shared responsibility. During National Cybersecurity Awareness Month, the Administration has educated the general public about the evolving risk of cyber threats through its "Stop. Think. Connect." campaign and reminded the American people, government agencies, and industry that everyone has a role to play in guarding against cyber attacks. At the same time, Administration officials have leveraged the momentum of National Cybersecurity Awareness Month to announce changes in government organizational relationships designed to enhance the security of federal information assets and networks in cyberspace, such as the Memorandum of Agreement between the U.S. Department of Defense (DoD) and the U.S. Department of Homeland Security (DHS) formalizing agency roles and responsibilities for coordinating cybersecurity. One area that has received less public attention is the need for government to enhance its partnership with the private sector.
Building this partnership and clarifying these roles and responsibilities is critical. The private sector's resources are inextricably linked to our government's efforts to successfully secure federal information in cyberspace for several key reasons, most notably:
- Much of the nation's cyber infrastructure is owned and operated by the private sector. Because the public, government, educational institutions, and industry rely on cyberspace, an attack against a major player in the Information Technology (IT) infrastructure sector may not be just an attack against a company. Instead, it may result in an attack against the Internet itself and may impact citizens, governments, and companies across the globe. The federal cybersecurity community must clarify the degree to which government and industry should partner to prevent, detect, and defend against these challenges
- Each key sector of the nation's Critical Infrastructure and Key Resources (CIKR) leverages cyberspace to perform mission-critical tasks.Cyberspace minimizes and, in some instances, eliminates jurisdictional, organizational, and technical boundaries of CIKR sectors (e.g., emergency services, defense industrial base, communications, government facilities, etc.). While the increased capability to share information across sectors enables private sector and government CIKR stakeholders to perform more efficiently and effectively, it also creates additional vulnerabilities in cyberspace. In order to truly be prepared to meet the challenges posed by cyber attacks that could threaten the security of multiple CIKR sectors, the federal government must enhance its partnership with private sector CIKR stakeholders
- There is a shortage of cybersecurity talent in government. While the Cyberspace Policy Review included the need to expand and train its workforce as a key priority, and efforts are underway toward that end, the reality is…the government can't do it alone. Cyber attacks are a constantly evolving, significant threat to our national security and the federal government. In the short-term, the federal government has an immediate need for a qualified, seasoned cybersecurity workforce (e.g., Information System Security Officers (ISSO), cyber strategists, security operations specialists, and program managers, etc.) and must fill these gaps by augmenting its existing workforce with the resources available in the private sector. Long-term, the federal government must assess its broader cyber workforce strategy and the role that the private sector plays in meeting mission-critical cyber requirements