Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Keith Alexander
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
Tags: management , insider threat , Beth Cobert , OMB , John Fitzpatrick , NARA , information sharing , Patrick Kennedy , State Department , NSA , Ed Hammersla , Raytheon , CA Technologies , Bill Harrod , Intelligence National Security Alliance , Dawn Cappelli , Rockwell Automation , Trust Redefined: Reconnecting Government and its Employees , Jason Miller
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
Tags: Teri Takai , FedRAMP , GSA , DoD , Edward Snowden , cloud , cybersecurity , Mike Rogers , Robert Work , Treasury , Mark Reger , Danny Werfel , Norman Dong , OMB , Anne Rung , Dennis VanderTuig , Dan Gordon , OFPP , Lesley Field , Jason Miller , Inside the Reporters Notebook
Gen. Keith Alexander, who will soon retire as the first commander of U.S. Cyber Command, said his organization has matured to the point that it should join the club of unified commands that report directly to the President.
Inside the Reporter's Notebook: OMB adds clarity to new cyber policy; Cyber risks during shutdown overstated; OASIS delayed indefinitely
The White House is finalizing its first major cybersecurity policy in more than three years.
Tags: technology , cybersecurity , government shutdown , OMB , Sylvia Burwell , continuous monitoring , GSA , OASIS , contracting , James Clapper , ODNI , DoD , security clearances , Greg Elin , FCC , James Cochrane , USPS , Ellis Burgoyne , chief data officer , Inside the Reporters Notebook , Jason Miller
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Tags: NSA , U.S. Cyber Command , Central Security Service , GDIT Cyber Reports , cybersecurity , Cybersecurity Workforce , workforce , government shutdown , National Cybersecurity Awareness Month , Michael OConnell
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
Tags: technology , cybersecuirty , Congress , Senate Intelligence Committee , House Intelligence Committee , Mike Rogers , Saxby Chambliss , Dutch Ruppersberger , NSA , DHS , Mike McCaul , Jared Serbu
On the Federal Drive show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.