Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: ISC2
ISC2 sponsored the challenge. The idea is to spark interest in the field of cybersecurity to help build a broader pool for a future cybersecurity workforce.
The Obama White House is trying to put its own stamp on how it wants to protect the federal government's cybersecurity infrastructure. That's the message in the Office of Management and Budget's "Fiscal Year 2009 Report to Congress on FISMA, the Federal Information Security Management Act."
"Security" is a word that gets woven in to nearly everything your agency does, so understanding what your security people are worried about is good information to have.
Federal Security Spotlight speaks with Thomas Schankweiler III, chief information security officer in the office of the Secretary of Health and Human Services.
January 13, 2011
As agencies try to hire hundreds of trained cybersecurity experts in the coming years, there are questions about whether that need can be met. Some observers wonder whether there really are enough cybersecurity workers.
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
In speech after speech, officials talk about the need for government and industry to work together to solve cybersecurity challenges. But for the past five years, a government-industry partnership has actually been making good on the promise of collaboration in the cybersecurity arena.
When it comes to securing the nation's cybersecurity infrastructure, how do federal officials think of the future? One of the top cybersecurity officials at the Department of Homeland Security weighed in on the topic at the ISC2 SecureAmericas conference yesterday.
CISO survey released, Stock market may have been victim of cyberattack
The Government Information Security Leadership Awards (GISLAs) program has been recognizing the ongoing commitment by federal information security leaders to build a highly qualified and ethical workforce. Director Sarah Bohne tells us what's new for this year.