Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: NIST
SecureKey Technologies will build a portal in the cloud to handle the identity management process and connect one username or password or digital certificate to many services. The contract is worth $15.1 million over three years.
Tags: technology , identity management , cloud computing , USPS , Naomi Lefkovitz , National Strategy for Trusted Identities in Cyberspace , SecureKey Technologies , industry , contracting , Federal Cloud Credential Exchange , Jason Miller
The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.
NIST and the National Cybersecurity Center of Excellece (NCCoE) want to facilitate public-private collaborations surrounding cybersecurity solutions by creating a new research-and-development center.
Alex Grohmann and John Dyson from the Northern Virginia Chapter of the Informations Systems Security Association, join host John Gilroy to talk about what you can do to make your agency more secure.
July 9, 2013
Tags: technology , FedRAMP , IT security , cloud computing , Information Systems Security Association , ISSA NOVA , Alex Grohmann , Morgan Franklin , John Dyson , Deloitte , continuous monitoring , NIST 800-53 , NIST special publication 800-53 Rev 4 , information technology , John Gilroy , Federal Tech Talk
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.
DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.
In an effort to incorporate iris, facial and fingerprint recognition technologies across the government, the House Oversight and Government Reform Subcommittee pressed the National Institute of Standards and Technology to set a date for the release of national biometric recognition standards.
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.
Tags: cybersecurity , Congress , cybersecurity framework , critical infrastructure , Patrick Gallagher , Keith Alexander , Jared Serbu , U.S. Cyber Command , industry , Senate Appropriations Committee
Phillip Soloweszyk, director of Identity and Windows Consulting Services for Quest Software, will discuss identity management.
APril 16, 2013
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.