Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Information Security and Privacy Advisory Board
The Enhanced Cybersecurity Services program has seen a lot of interest by vendors, but few have invested in accepting cyber threat data from the government. Meanwhile, the Cyber Information Sharing and Collection Program is growing through the two-way sharing of unclassified threat indicators.
FedRAMP is reviewing six applications from vendors and plans on awarding at least three with the authority to operate by the end of the year. GSA's Kathy Conrad said a survey identified more than 80 opportunities for cloud services. GSA to hold FedRAMP webinar tomorrow.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
Tags: technology , cybersecurity , Obama Impact , David Smith , Potomac Institute , Bob Dix , Juniper Networks , Patrick Howard , SecureInfo Corp. , Phyllis Schneck , McAfee , White House , Congress , Larry Clinton , Internet Security Alliance , Jason Miller
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , cybersecurity , Karen Evans , Frank Reeder , Dan Chenok , OMB , technology , NIST , DHS , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
GSA's Dave McClure said a flood of documents will come as soon as OMB signs off on the cloud security guidance. McClure said among the documents will be the application for third party companies to become FedRAMP accreditors of cloud products and services.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , secure identity cards , HSPD-12 , continuous monitoring , Jason Miller , CyberStat , Good Harbor Consulting
Charles Romine has been selected to replace Furlani as the head of the NIST IT lab.