Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Information Sharing
Gen. Keith Alexander said a recent cyber exercise is the first time the military showed it can do offensive and defensive capabilities at the same time, by the same team. This was part of Alexander's answers to questions from Sen. John McCain.
The government is working with a cobbled-together set of authorities and responsibilities when it comes to protecting networks from cyber threats, a top Homeland Security Department cyber official said Wednesday. Congress needs to act soon to update the nation's cybersecurity posture, he said.
Tags: cybersecurity , DoD , DHS , critical infrastructure , information sharing , University of Rhode Island , ODNI , DIA , U.S. Cyber Command , James Langevin , Michael Flynn , Mark Weatherford , Jared Serbu
The House is expected to vote on — and pass — the bipartisan Digital Accountability and Transparency Act, which aims to save taxpayer money by tracking spending by federal agencies.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.
The administration has tried to get in front of the debate over the information sharing aspects of one of the cybersecurity bills up for debate in the House Thursday. Democratic lawmakers and industry groups expressed concern over the Cyber Intelligence Sharing and Protection Act (CISPA) arguing its provisions on what information is to be shared and with whom are too broad.
Tags: technology , White House , Mike Rogers , Dutch Ruppersberger , cybersecurity , information sharing , Critical infrastructure protection , Congress , House , Senate , Cyber Intelligence Sharing and Protection Act , Jason Miller
Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.) introduced legislation to make sharing of classified cyber threat information easier between the government and the private sector. The bill builds on DoD's Defense Industrial Base pilot to share data about vulnerabilities. DoD plans to expand the DIB pilot to more than 200 companies in the coming year.
Tags: technology , cybersecurity , DoD , DHS , House Intelligence Committee , House Armed Services Committee , Teri Takai , Keith Alexander , Mike Rogers , Dutch Ruppersberger , information sharing , defense industrial base , Jason Miller
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
After a decade of unsuccessful attempts, including the Justice Department's Integrated Wireless Network, the Homeland Security Department wants to leap forward with technology by using commercial 4G networks to connect law enforcement agencies. DHS created a joint program office to lead the effort. The approach is part of OMB's shared services initiative for agencies to work together on big programs.
Tags: technology , DHS , OMB , VA , USDA , Chris Smith , Richard Spires , Steve VanRoekel , Roger Baker , shared services , information sharing , law enforcement networks , Future First , IT project management , IT efficiencies , budget , AFCEA Bethesda , Jason Miller
The Navy is in the early stages of trying to figure out how to move from a net-centric view of its information systems to one that focuses on the data itself. The service is looking to the experiences of the intelligence community to improve data tagging and data sharing.
DHS officials said they're only monitoring Twitter and Facebook to get situational awareness of the homeland security situation. Congress seems unconvinced. Privacy group wants lawmakers to take action to stop DHS.
Tags: Privacy Act , privacy , civil liberties , DHS , Congress , social media , information sharing , Patrick Meehan , Jackie Speier , Electronic Privacy Information Center , Mary Ellen Callahan , Jared Serbu , Web 2.0