Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Information Sharing
The Transportation Security Administration already shares intelligence it collects with airports. Now a House bill would expand TSA's intel sharing to local mass transit systems as well.
Secretary Leon Panetta and Secretary Eric Shinseki announce an expansion in 2014 of initial capability of the joint electronic health record to two more sites.
The Arizona senator sent the third in a series of letters to Gen. Keith Alexander trying to explain why DoD, not DHS, should be in charge of defending critical infrastructure from cyber attacks. He said the administration's approach would create another layer of bureaucracy and slow down responses to threats.
Gen. Keith Alexander said a recent cyber exercise is the first time the military showed it can do offensive and defensive capabilities at the same time, by the same team. This was part of Alexander's answers to questions from Sen. John McCain.
The government is working with a cobbled-together set of authorities and responsibilities when it comes to protecting networks from cyber threats, a top Homeland Security Department cyber official said Wednesday. Congress needs to act soon to update the nation's cybersecurity posture, he said.
Tags: cybersecurity , DoD , DHS , critical infrastructure , information sharing , University of Rhode Island , ODNI , DIA , U.S. Cyber Command , James Langevin , Michael Flynn , Mark Weatherford , Jared Serbu
The House is expected to vote on — and pass — the bipartisan Digital Accountability and Transparency Act, which aims to save taxpayer money by tracking spending by federal agencies.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.
The administration has tried to get in front of the debate over the information sharing aspects of one of the cybersecurity bills up for debate in the House Thursday. Democratic lawmakers and industry groups expressed concern over the Cyber Intelligence Sharing and Protection Act (CISPA) arguing its provisions on what information is to be shared and with whom are too broad.
Tags: technology , White House , Mike Rogers , Dutch Ruppersberger , cybersecurity , information sharing , Critical infrastructure protection , Congress , House , Senate , Cyber Intelligence Sharing and Protection Act , jason miller
Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.) introduced legislation to make sharing of classified cyber threat information easier between the government and the private sector. The bill builds on DoD's Defense Industrial Base pilot to share data about vulnerabilities. DoD plans to expand the DIB pilot to more than 200 companies in the coming year.
Tags: technology , cybersecurity , DoD , DHS , House Intelligence Committee , House Armed Services Committee , Teri Takai , Keith Alexander , Mike Rogers , Dutch Ruppersberger , information sharing , defense industrial base , jason miller
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , jason miller