Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Information sharing
Try as it may to may information easier to obtain and clearer to understand, the government's efforts to be more transparent often fall short.
The Enhanced Cybersecurity Services program has seen a lot of interest by vendors, but few have invested in accepting cyber threat data from the government. Meanwhile, the Cyber Information Sharing and Collection Program is growing through the two-way sharing of unclassified threat indicators.
Federal CIO Steven VanRoekel said the benefits will outweigh the concerns about making information more accessible.
May 29, 2013
Frank Kendall says many different factors played into the Pentagon's decision to go with a competitive bidding process to develop its integrated electronic health record system, instead of adopting VA's VistA program. He said DoD wants to ensure its system is interoperable not just with VA hospitals but with civilian health facilities as well. In addition, Kendall cited cultural differences between the two large agencies.
President Barack Obama issued a new policy and signed an Executive Order requiring data to be open, machine-readable and safeguarded.
Senate lawmakers are promising to change the laws to let agencies have easier access to the Death Master File and other key databases. Starting June 1, agencies must check the Do Not Pay list before issuing any money.
Tags: management , financial management , Danny Werfel , OMB , Richard Gregg , Treasury , Tom Coburn , Tom Carper , Senate Homeland Security and Governmental Affairs , improper payments , SSA , Death Master File , information sharing , Marianna LaCanfora , Jason Miller
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , McAfee , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , Teri Takai , information sharing , Public-private partnership , Threat intelligence , Jason Miller
Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission, will discuss interoperability and how to transfer sensitive healthcare data in a secure manner.
April 23, 2013
Tags: technology , compliance , Healthcare IT , interoperability , Jason Miller , electronic health records , Lee Barrett , EHNAC , HIPPA , records sharing , records management , John Gilroy , Federal Tech Talk , Department of Veterans Affairs , Electronic health records sharing , information sharing , HHS , secure messaging , WEDI
A memo obtained by Federal News Radio points to a split in thinking inside the Pentagon's efforts to achieve interoperability with VA's electronic health record system. An assessment by the Pentagon's office of operational test and evaluation, an internal acquisition watchdog, finds DoD's project to build a new electronic health record is "likely to be detrimental to the President's goals" for interoperable health IT.
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.