Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Howard Schmidt
Chunks of Comprehensive National Cybersecurity Initiative to be declassified, Microsoft: Don't press F1 key in Windows XP
From Capitol Hill, most, but not all, lawmakers have generally good reviews for President Obama's pick to be cybersecurity coordinator.
Van Hitch will retire as the Justice Department's CIO at the end of July. He said cybersecurity, information sharing and social media and mobile computing were among the biggest technology transformations he saw.
July 21, 2011
House lawmakers want to add the requirement for a White House official to oversee cybersecurty policy and budget across civilian agencies. Rep. Langevin said the current set up with DHS in charge of civilian networks isn't good enough. Members also want more attention paid to the security of the supply chain.
Tags: technology , management , Greg Schaffer , Jim Langevin , Jason Chaffetz , Elijah Cummings , DHS , White House , House Oversight and Government Reform Committee , Cybersecurity , supply chain security , FISMA , Jason Miller
The White House cybersecurity advisor said many of his office's initiatives are in the operational stages and are making a difference. But some in industry and government say there is a vacuum in leadership from his office and OMB. Howard Schmidt says it's clear what role his office, OMB and DHS play.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be "to the extent of mass hysteria".
The National Strategy for Trusted Identities in Cyberspace has come under fire due to the possible government overreach and added bureaucracy.