Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: FISMA
An independent group's report offers ways for agencies to evolve to continuous monitoring and risk-based approaches to cybersecurity within the existing Federal Information Security Management Act, and proposes more cooperation between CIOs and agency inspectors general.
Federal agencies reported more than 48,000 cyber attacks in 2012 and continue to struggle to defend their networks, according to a new report from the Government Accountability Office. Senators are now renewing their push for comprehensive cyber legislation, which would include an update to FISMA.
Tags: technology , cybersecurity , Senate Homeland Security & Governmental Affairs Co , Tom Coburn , Tom Carper , DHS , Janet Napolitano , cyber executive order , OMB , jason miller , Senate Homeland Security & Governmental Affairs Co
The 10-year-old law created a centralized oversight and advocate in OMB for IT management and programs. It also focused on making the government more citizen-centered and having agencies collaborate on delivering services to the public.
Tags: technology , management , Karen Evans , Dan Chenok , Kevin Landy , Mark Forman , Doug Bourgeois , Information Technology and Innovation Foundation , E-Government Act of 2002 , IBM , Government Transaction Services , VMware , jason miller
From passing cyber legislation to training the future workforce to handle cyber threats, the federal government still has several important items on its cyber agenda.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , continuous monitoring , Cyber Workforce , jason miller
The annual reporting memo gives agencies 57 questions and answers as they prepare their 2012 cybersecurity report.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.
The revised Cybersecurity Act of 2012 removes DHS from having sole oversight authority of critical infrastructure and shares the responsibility across an interagency council. The bill also would make the implementation of cyber standards by critical infrastructure operators voluntary. The legislation encourages an incentive-based program.