Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: NIST
Anti-US hacker takes credit for 'Here you have' worm
September 22nd at 11 AM
Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure.
This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.
CBP lax in controlling cybersecurity
Agencies and vendors soon will be able to submit cloud-based products and services to be certified and accredited once and be available for use by all of government. Version 2 of the FedRAMP security controls should be ready in the next few weeks. Cloud working group still must address several questions about the approval process.
Learn more about the Internet Policy Task Force
Ari Schwartz is leaving the Center for Democracy and Technology after 13 years to join the National Institute of Standards and Technology as a senior Internet policy advisor. He explains the decision to become a fed.
It's a saying many of us have grown to hate, but Apple's iPad really is being tested to see if it's "good enough for government work."
Learn more in today's cybersecurity update.
Long-time privacy and cybersecurity expert to join the government to work on similar issues. EPA's Lisa Schlosser also takes on a new role at her agency.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , Cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , Hilary Ward , Global Transaction Services