Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Information sharing
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , McAfee , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , Teri Takai , information sharing , Public-private partnership , Threat intelligence , Jason Miller
Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission, will discuss interoperability and how to transfer sensitive healthcare data in a secure manner.
April 23, 2013
Tags: technology , compliance , Healthcare IT , interoperability , Jason Miller , electronic health records , Lee Barrett , EHNAC , HIPPA , records sharing , records management , John Gilroy , Federal Tech Talk , Department of Veterans Affairs , Electronic health records sharing , information sharing , HHS , secure messaging , WEDI
A memo obtained by Federal News Radio points to a split in thinking inside the Pentagon's efforts to achieve interoperability with VA's electronic health record system. An assessment by the Pentagon's office of operational test and evaluation, an internal acquisition watchdog, finds DoD's project to build a new electronic health record is "likely to be detrimental to the President's goals" for interoperable health IT.
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
Doctor Doug Fridsma, chief science officer for HHS's Office of the National Coordinator for Health Information Technology, will discuss how interoperability will make it easier to share health information.
April 2, 2013
Tags: technology , Healthcare IT , interoperability , electronic health records , enterprise systems , HHS , Office of the National Coordinator for Health IT , information sharing , records management , Blue Button initiative , mobile devices , health information exchange , John Gilroy , Federal Tech Talk , Doug Fridsma
President Obama's recent executive order directing that cyber threat information be shared more broadly with the private sector risks making the data less useful to the intelligence agencies that gather and process it. But the risk is worth the potential reward.
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Tags: technology , NIST , Patrick Gallagher , DHS , Bruce McConnell , Jane Holl Lute , Michael Daniel , White House , cybersecurity , information sharing , Verizon , U.S. Chamber of Commerce , Alan Paller , SANS Institute , Craig Silliman , Jason Miller
Despite a veto threat a year ago, House proponents of a cyber information sharing bill say productive talks now are underway with the Obama administration. Reps. Mike Rogers and Dutch Ruppersberger re-introduced the Cyber Intelligence Sharing and Protection Act (CISPA) trying to address privacy and civil liberties concerns.
Tags: Congress , cybersecurity , Dutch Ruppersberger , Mike Rogers , House Intelligence Committee , CISPA , White House , information sharing , CSIS , The Constitution Project , Privacy and civil liberties , Sharon Bradford Franklin , Jared Serbu
Senior administration officials say the Executive Order is not a replacement for comprehensive cybersecurity legislation, but the start of a new conversation for how best to protect the nation's critical infrastructure. NIST released an RFI Tuesday as part of its effort to create a voluntary, flexible framework. And DHS will expand the number of companies the government shares classified and unclassified cyber threat information with through the Defense Industrial Base pilot.