Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Information sharing
The White House's new national strategy for information sharing highlights the concept of collaboration in cybersecurity efforts. Michael Daniel, the White House cybersecurity coordinator, told the Federal Drive information security and information sharing are "mutually reinforcing."
A decade in the making, the Army gets the nod to start deploying a multi-billion dollar computing infrastructure to support intelligence work.
President Barack Obama has issued new agency standards for protecting classified information from insider threats. In a Presidential Memorandum issued Wednesday, Obama provided the heads of executive branch departments and agencies the new National Insider Threat Policy as well as the minimum standards to be employed by each agency in standing up its own insider-threat programs. Details on the new policy and the standards were not made public.
The heads of DoD and VA met on Thursday, and decided they wanted to a plan to speed up the delivery of an integrated health record system, currently scheduled for implementation in 2017.
The two agencies met this week to figure out how best to implement the recommendations in a white paper from ACT-IAC. The approach detailed in the document follows closely the methodology used to develop the NIEM and FICAM standards.
Debora Plunkett, the director of the National Security Agency's Information Assurance Directorate, said there is good news and bad news when it comes to protecting the U.S. from cyber threats on a daily basis. In an exclusive interview for Federal News Radio's Agency of the Month program, Plunkett said getting the nation's networks to a higher level of security is multifold.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
Federal News Radio polled current and former federal cybersecurity experts for their opinion on what were the most significant accomplishments since 2006 to secure federal networks and improve public-private partnerships. The list blends suggestions of more than 10 authorities on federal cybersecurity. The accomplishments are in no particular order.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
Tags: technology , acquisition , identity management , Tom McCarty , DHS , Kshemendra Paul , Information Sharing Environment , Sharon James , IRS , Naomi Lefkovitz , NIST , cloud computing , information sharing , back-end attribute exchange , GSA , PortfolioStat , HSPD-12 , AFCEA Bethesda , ACT-IAC , standards based acquisition model , Jason Miller