bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:08 am, October 23, 2014

Search Result

Search Tags:  GAO

Top agencies still at risk for cybersecurity attack

Senator Tom Carper of Delaware says the results from a new Government Accountability Office study are evidence that lawmakers should enact tougher rules to ensure the security of federal data -- like his bill -- Data Security and Breach Notification Act.

Tags: cybersecurity , Cybersecurity Report , DorobekInsider , Tom Carper

Monday - 09/20/2010, 07:01pm EDT

Government slams DoL program to protect whistleblowers

The federal agency in charge of worker safety is not protecting whistleblowers from employer retaliation, ProPublica reports.

Tags: OSHA , whistleblower , Dorobek Insider , Must Reads

Monday - 09/20/2010, 05:02pm EDT

GAO: Sensitive info may be in danger

How sure are you that the contractors you're working with at your agency are handling sensitive information in the way that they should - or that you expect they will? John Needham is the Director of Acquisition and Sourcing Issues at GAO.

Tags: Dorobek Insider , John Needham , contracting , sensitive information

Thursday - 09/16/2010, 06:00pm EDT
Listen

Strides made to harmonize IT security systems across agencies

According to a recent GAO report, there's now proof that national security and non-national security IT systems can work together effectively.

Tags: Cybersecurity Update , cybersecurity , IT systems

Thursday - 09/16/2010, 05:25pm EDT

Welcome to KCG's Trusted Advisor Blog

Cybersecurity is among the federal government's top priorities…and with good reason. The cyber threat is complex and evolving rapidly. According to the U.S. Government Accountability Office (GAO), the number of cyber incidents reported by federal agencies increased by 400% over a four year period. Also, cyber threats come from multiple sources (e.g., terrorists, criminal organizations, hackers, disgruntled insiders, rogue nations, etc.) with a host of motivations for, and resources to, attack.

To beat the cyber threat, federal Chief Information Security Officers (CISOs) must assess risk, develop cybersecurity policies, and build the operational infrastructure to execute an agency cybersecurity program. They also need experienced cybersecurity professionals - that's where we come in… A dedicated cybersecurity firm - and the market leader in providing risk management, governance, operations, and compliance services to the federal government - our team takes pride in being the government's trusted advisor for cybersecurity.

In this space, we will share our insights on the news, challenges, and policies that drive decision-making and problem solving around cybersecurity in the federal government. By discussing key cybersecurity topics in this blog, and highlighting those of other federal community thought leaders in our companion "Trusted Advisor Series" on WTOP radio, we hope to add value to this critical dialogue. We look forward to sharing this online experience with you. - KCG's Trusted Advisor

Tags: technology , Trusted Advisor Center , cyber , cybersecurity , Trusted Advisor , Cyber threat , hack , CISO

Friday - 09/10/2010, 06:19pm EDT

Building architecture for enterprise success

Learn more about a new GAO report

Tags: DorobekInsider , newscast , management , enterprise architecture , Randy Hite

Thursday - 09/09/2010, 07:29pm EDT
Listen

GAO ranks near top of best-to-work-for-agency list

GAO scored number two on the best agency to work for list. How do they get there?

Tags: DorobekInsider , newscast , management , Sallyanne Harper

Thursday - 09/02/2010, 06:40pm EDT
Listen

GAO: Cybersecurity information sharing can improve

This week, FSS talks to Dave Powner, the director of information technology management issues at the Government Accountability Office.
Sept. 2, 2010

Tags: technology , Federal Security Spotlight , Tom Temin , Dave Powner

Thursday - 09/02/2010, 01:32pm EDT
Listen

Where will future cyberpros come from?

In the last 18 months, Melissa Hathaway said, cybersecurity threats have gotten far more stealthy and there is an understanding that it's not just an Internet-based threat. It can come from a multi-media device internally or even a wi-fi device.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Melissa Hathaway , David Powner

Thursday - 09/02/2010, 08:30am EDT
  •  
  • 74
  •