Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Information Sharing
The Inspector General Act gives IGs authority to obtain any information necessary for their investigations, but some agencies are giving IGs a hard time with their requests. Members of Senate and House oversight committees are calling on Shaun Donovan, the recently confirmed director of the Office of Management and Budget, to address the issue.
Tags: inspector general , OMB , Senate Homeland Security and Governmental Affairs Committee , House Oversight and Government Reform Committee , Tom Carper , Tom Coburn , Darrell Issa , Elijah Cummings , Shaun Donovan , Stephanie Wasko , oversight , information sharing
Ash Ashutosh, CEO of Actifio, will discuss how his company can help your agency reduce the size and cost of its data center.
July 29, 2014
Army officials have withdrawn their intelligence network, DCGS-A, from a major testing exercise this fall because of software glitches, in the latest setback for the troubled system.
Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.
The Data Aggregation Working Group, or DAWG, will deliver both plans and tools later this year to change the way agencies review and share terrorism information. DAWG members hope the reference architecture, as the plan is called, will give law enforcement and intelligence community agencies a new path toward understanding the full threat picture. Dirk Rankin is the chief technology officer for the National Counterterrorism Center and the co-chairman of the Data Aggregation Working Group. Paul Reynolds is the other co-chairman. In part two of their interview, they tell executive editor Jason Miller about the DAWG's role in creating a secure information sharing environment. Read Jason's related article.
The Data Aggregation Working Group, under the Information Sharing Environment, is creating a data aggregation reference architecture to give law enforcement and intelligence agencies a better approach to sharing information more securely and more quickly. The group ran two pilots and created a tool kit for others to use.
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
Tags: management , insider threat , Beth Cobert , OMB , John Fitzpatrick , NARA , information sharing , Patrick Kennedy , State Department , NSA , Keith Alexander , Ed Hammersla , Raytheon , CA Technologies , Bill Harrod , Intelligence National Security Alliance , Dawn Cappelli , Rockwell Automation , Trust Redefined: Reconnecting Government and its Employees , Jason Miller
Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.
Security breaches in government and the private sector show that no network is completely safe. Now with funding from the State Department and USAID, the New America Foundation is promoting the idea of what it calls mesh networks — small, home-built communications systems that don't rely on the Internet. Sascha Meinrath is the founder of the Open Technology Institute at the New America Foundation. He joined Tom Temin and Emily Kopp on the Federal Drive and said the networks can support things like phone service, file sharing, and instant messaging.
The intelligence community and the Defense Department are both trying to build IT networks that attempt to get rid of IT stovepipes. In the process, they've found a few ways to work together.