Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: HSPD-12
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
In a new report to Congress, the administration said continuous monitoring is taking hold, but HSPD-12 still is floundering. OMB also reported agencies spent $13.3 billion on cybersecurity last year and that government employees make up 60 percent of the cyber workforce.
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Tags: technology , Alfred Rivera , DISA , Donna Dodson , NIST , cloud computing , Army , enterprise email , identity management , Common Access Card , cybersecurity , DoD , information sharing , Jason Miller
Federal News Radio's Jason Miller offers his top stories of 2011 and predictions for 2012.
Tags: technology , acquisition , 2011 and Beyond , Jason Miller , Dan Gordon , cybersecurity , acquisition workforce , shared services , cloud computing , mobile , open government , identity management , NSTIC , E-Government Fund
Randy Vanderhoof, the executive director of the alliance, joined the Federal Drive with Tom Temin and Amy Morris to discuss how the use of smart cards for identity and access are driving commercial security identity credentials.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , secure identity cards , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Watch or listen to this program on demand below
Originally Aired November 2nd @ 3:05pm
Tags: technology , identity management , Judy Spencer , GSA , Mike Butler , OSD , carol bales , OMB , barbara symonds , IRS , venkatapatni puvvada , Unisys , Gordon Hanah , Bearing Point , Jim Flyzik , Tom Trezza