Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: FBI
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
The new immigration law in Arizona is having a ripple effect across the country, and the debate over how authorities report the immigration status of suspects has now come to the D.C. area.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.
When it comes to securing the nation's cybersecurity infrastructure, how do federal officials think of the future? One of the top cybersecurity officials at the Department of Homeland Security weighed in on the topic at the ISC2 SecureAmericas conference yesterday.
The agency plans to deploy a high-speed network, new Office-based PCs, and other infrastructure improvements.
Hoping to make the third nomination the charm, the White House has tapped FBI Deputy Director John Pistole to head the Transportation Security Administration. Former nominee Erroll Southers tells us what's at stake.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
Learn more in today's cybersecurity update.
The FBI's establishment of the Resource Planning Office has helped to manage personnel resources and ensure those resources are aligned with the FBI's strategic goals. David Schlendorf, acting assistant director of the Resource Planning Office explains how it works.
Richard Haley II
Assistant Director and Chief Financial Officer, FBI's Financial Division