bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:35 am, September 1, 2014

Search Result

Search Tags:  Gary Galloway

Carrying On with Continuity of Operations

More than 80 percent of the federal systems count on private sector critical infrastructure to work.

Should one of the telecommunications, electricity or other providers be hacked or go down from a natural disaster, agency mission would be in peril.

Just take last summer's Derecho that impacted the Washington DC area. One agency lost their connection to the Internet for some time because of the storm even though their infrastructure was in the cloud.

Over the past decade or more, agencies have applied the lessons learned from the assortment of man-made and natural disasters that have impacted their services to keep their services running as smoothly as possible.

But with the emergence of cloud computing, virtualization, mobile computing and other technologies, what should agencies keep in mind to ensure the continuity of operations? How is the idea of COOP and disaster recovery changing? The panel, Carrying on with Continuity of Operations, will look at how agencies have implemented COOP and disaster recovery over the past decade and where they need to go next.

Tags: Symantec , technology , COOP , Carrying on with Continuity of Operations , Eric Hennessey , Reynold Schweickhardt , Jason Miller , Tod Henby

Friday - 03/01/2013, 05:07pm EST
Listen

Gary Galloway

Tags:

Tuesday - 03/05/2013, 03:38pm EST

Architecting Defense-in-Detail

August 11th at 11:05am

The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.

The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

Tags: technology , CA Technologies , Dynamic Cybersecurity , cybersecurity , Tim Brown , security , Robert Brese , DoE , State

Monday - 08/02/2010, 12:34pm EDT
Listen

Management of Change: preview from the co-chairs

Three people involved with The Management of Change conference next week offer some insight into what the conference is about.

Tags: In Depth , Francis Rose , management , Management of Change 2010 , ACT , Mary Souther , Prashant Gaur

Tuesday - 05/18/2010, 07:55pm EDT
Listen

The State Department on cybersecurity

Gary Galloway
Deputy Chief Information Security Officer
and
John Streufert
CISO
June 25, 2009

Tags: FSS , Tom Temin , State Department , John Streufert

Wednesday - 06/24/2009, 04:26pm EDT