Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Hord Tipton
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Hord Tipton, the executive director of ISC2 and the former chief information officer at the Interior Department, joined In Depth with Francis Rose to discuss the "red flags" managers should look for in the hiring process.
Agencies, vendors can comment until Friday on the draft standard describing cybersecurity workers. A common definition will help agencies classify who is a cyber worker.
Watch or listen to this program on demand below
Executive Director Hord Tipton discusses what agencies are planning.
The Obama White House is trying to put its own stamp on how it wants to protect the federal government's cybersecurity infrastructure. That's the message in the Office of Management and Budget's "Fiscal Year 2009 Report to Congress on FISMA, the Federal Information Security Management Act."
"Security" is a word that gets woven in to nearly everything your agency does, so understanding what your security people are worried about is good information to have.
Cyber-attackers could view a shutdown as the perfect opportunity to infiltrate government systems. ISC squared's Hord Tipton joins us with analysis.
The federal government's list of so called 'emergency' or 'excepted' IT personnel hasn't been updated in 15 years.