Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Information Security and Privacy Advisory Board
The Enhanced Cybersecurity Services program has seen a lot of interest by vendors, but few have invested in accepting cyber threat data from the government. Meanwhile, the Cyber Information Sharing and Collection Program is growing through the two-way sharing of unclassified threat indicators.
FedRAMP is reviewing six applications from vendors and plans on awarding at least three with the authority to operate by the end of the year. GSA's Kathy Conrad said a survey identified more than 80 opportunities for cloud services. GSA to hold FedRAMP webinar tomorrow.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , Cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
Tags: technology , Cybersecurity , Obama Impact , David Smith , Potomac Institute , Bob Dix , Juniper Networks , Patrick Howard , SecureInfo Corp. , Phyllis Schneck , McAfee , White House , Congress , Larry Clinton , Internet Security Alliance , Jason Miller
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , Cybersecurity , Karen Evans , Frank Reeder , Dan Chenok , OMB , technology , NIST , DHS , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
GSA's Dave McClure said a flood of documents will come as soon as OMB signs off on the cloud security guidance. McClure said among the documents will be the application for third party companies to become FedRAMP accreditors of cloud products and services.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , Cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , secure identity cards , HSPD-12 , continuous monitoring , Jason Miller , CyberStat , Good Harbor Consulting
Charles Romine has been selected to replace Furlani as the head of the NIST IT lab.