Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: FISMA
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency.
September 10, 2013
Tags: technology , information technology , IT security , FedRAMP , social media , physical security , Terry Gudaitis , Cyveillance , Mindstar Security , FourSquare , spear phishing , malware , Twitter , John Gilroy , Federal Tech Talk
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.
An independent group's report offers ways for agencies to evolve to continuous monitoring and risk-based approaches to cybersecurity within the existing Federal Information Security Management Act, and proposes more cooperation between CIOs and agency inspectors general.
Federal agencies reported more than 48,000 cyber attacks in 2012 and continue to struggle to defend their networks, according to a new report from the Government Accountability Office. Senators are now renewing their push for comprehensive cyber legislation, which would include an update to FISMA.
Tags: technology , cybersecurity , Senate Homeland Security & Governmental Affairs Co , Tom Coburn , Tom Carper , DHS , Janet Napolitano , cyber executive order , OMB , Jason Miller , Senate Homeland Security & Governmental Affairs Co
The 10-year-old law created a centralized oversight and advocate in OMB for IT management and programs. It also focused on making the government more citizen-centered and having agencies collaborate on delivering services to the public.
Tags: technology , management , Karen Evans , Dan Chenok , Kevin Landy , Mark Forman , Doug Bourgeois , Information Technology and Innovation Foundation , E-Government Act of 2002 , IBM , Government Transaction Services , VMware , Jason Miller
From passing cyber legislation to training the future workforce to handle cyber threats, the federal government still has several important items on its cyber agenda.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , Continuous monitoring , Cyber Workforce , Jason Miller
The annual reporting memo gives agencies 57 questions and answers as they prepare their 2012 cybersecurity report.