Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: NIST
DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.
In an effort to incorporate iris, facial and fingerprint recognition technologies across the government, the House Oversight and Government Reform Subcommittee pressed the National Institute of Standards and Technology to set a date for the release of national biometric recognition standards.
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.
Tags: cybersecurity , congress , cybersecurity framework , critical infrastructure , Patrick Gallagher , Keith Alexander , Jared Serbu , U.S. Cyber Command , industry , Senate Appropriations Committee
Phillip Soloweszyk, director of Identity and Windows Consulting Services for Quest Software, will discuss identity management.
APril 16, 2013
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.
Tags: technology , cybersecurity , Michael Daniel , White House , OMB , Trusted Internet connection , HSPD-12 , continuous monitoring , PIO , CIO , performance mangement , GSA , DHS , Jason Miller , exclusive
Glenn Schoonover from Koolspan will discuss mobile security with host John Gilroy.
February 19, 2013
Tags: technology , mobile device management , mobile security , smart phones , iPhone , Glenn Schoonover , Koolspan , micro SD card , encryption , mobile software , passwords , Federal Tech Talk , John Gilroy
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Tags: technology , Patrick Gallagher , DHS , Bruce McConnell , Jane Holl Lute , Michael Daniel , White House , cybersecurity , information sharing , Verizon , U.S. Chamber of Commerce , Alan Paller , SANS Institute , Craig Silliman , Jason Miller
Senior administration officials say the Executive Order is not a replacement for comprehensive cybersecurity legislation, but the start of a new conversation for how best to protect the nation's critical infrastructure. NIST released an RFI Tuesday as part of its effort to create a voluntary, flexible framework. And DHS will expand the number of companies the government shares classified and unclassified cyber threat information with through the Defense Industrial Base pilot.
Ron Ross of the National Institute of Standards and Technology wants feedback on the agency's IT security and privacy controls. Deputy Commissioner Wanda Rogers of the Treasury Department's Financial Management Service talks about the final transition to E-Payments. Philip Lohaus is a research fellow with the American Enterprise Institute and former Defense Department analyst who has studied and blogged about how the CIA is two organizations in one.
Tags: Ron Ross , Wanda Rodgers , Tom Davis , Philip Lohaus , Sen. Ben Cardin , Treasury Department , Deloitte & Touche , House Oversight and Government Reform Committee , CIA , Federal Drive , Deloitte & Touche