Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: FISMA
Sanjay Sardar, FERC's CIO, joined to discuss the agency's FISMA stance.
The department released a request for information for 11 email and collaboration services in the cloud. The RFI comes after Onix and Google dropped its protest of Interior's award to Softchoice and Microsoft for cloud email in October 2010.
Bruce Levinson, with the Center for Regulatory Effectiveness, joined the with Tom Temin and Amy Morris to discuss the center's recent survey on agency FISMA compliance.
Agency recently made the switch; Global Computer Enterprises is providing the solution and explains.
Learn more in today's cybersecurity update
Sen. Tom Carper (D-Del.) said his subcommittee will take up the subject of energy conservation and the federal government when Congress goes back in session next week.
Vice President for Research
Oct. 23rd, 2008
Guest: John Gilligan
Dec. 12, 2008
Testimony obtained by FederalNewsRadio says IT security measurements focus too much on compliance and not on risk. GAO surveyed 24 agencies and found few have moved beyond just fulfilling FISMA requirements.
Tags: technology , Greg Wilshusen , Vivek Kundra , John Streufert , GAO , OMB , State Department , Senate Homeland Security and Governmental Affairs , NIST , Tom Davis , Deloitte , Cybersecurity , risk management
Agencies would be asked to report on 11 categories to determine the status of their computer network security.