Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.
Tags: technology , cybersecurity , Michael Daniel , White House , OMB , Trusted Internet connection , HSPD-12 , continuous monitoring , PIO , CIO , performance mangement , GSA , DHS , Jason Miller , exclusive
Glenn Schoonover from Koolspan will discuss mobile security with host John Gilroy.
February 19, 2013
Tags: technology , mobile device management , mobile security , smart phones , iPhone , Glenn Schoonover , Koolspan , micro SD card , encryption , mobile software , passwords , Federal Tech Talk , John Gilroy
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Tags: technology , Patrick Gallagher , DHS , Bruce McConnell , Jane Holl Lute , Michael Daniel , White House , cybersecurity , information sharing , Verizon , U.S. Chamber of Commerce , Alan Paller , SANS Institute , Craig Silliman , Jason Miller
Senior administration officials say the Executive Order is not a replacement for comprehensive cybersecurity legislation, but the start of a new conversation for how best to protect the nation's critical infrastructure. NIST released an RFI Tuesday as part of its effort to create a voluntary, flexible framework. And DHS will expand the number of companies the government shares classified and unclassified cyber threat information with through the Defense Industrial Base pilot.
Ron Ross of the National Institute of Standards and Technology wants feedback on the agency's IT security and privacy controls. Deputy Commissioner Wanda Rogers of the Treasury Department's Financial Management Service talks about the final transition to E-Payments. Philip Lohaus is a research fellow with the American Enterprise Institute and former Defense Department analyst who has studied and blogged about how the CIA is two organizations in one.
Tags: Ron Ross , Wanda Rodgers , Tom Davis , Philip Lohaus , Sen. Ben Cardin , Treasury Department , Deloitte & Touche , House Oversight and Government Reform Committee , CIA , Federal Drive , Deloitte & Touche
Through the Digital Government Strategy, several initiatives are underway to address IT security concerns. DHS created a security baseline architecture and is testing it through five use cases. GSA created a new secure online content platform for agencies to move websites and applications into a mobile environment.
The department is creating and trying out a universal curriculum for five foundational cyber roles in 2013. DISA is leading the effort and will add new roles next year as it refines the training. The agency says it is doing all it can to synchronize its training not just across DoD, but across the entire federal government in line with the National Initiative for Cybersecurity Education (NICE).
OMB and NIST are seeking help from industry and academia on how to integrate cloud computing and the large amount of information that is created from mobile computing. The goal is not just to know what data agencies have, but the value the data brings. With all this focus on cloud and big data integration, could agencies be on the hook for a new "big data" strategy?
The Postal Service issued a draft solicitation for the Federal Cloud Credential Exchange. The goal is to create a cloud-based service to perform identity authentication and verification. Agencies could plug into the service, integrating it with any application that adheres to the standards.
Tags: technology , cloud computing , identity management , USPS , Jeremy Grant , Judy Spencer , CertiPath , Bill Corrington , Stony Point Enterprises , Federal Cloud Credential Exchange , Jason Miller
IT Lab Director Charles Romine said the organization collaborates with an ever-growing number of agencies on technology challenges. He said the Lab also is focusing on questions around cloud, cybersecurity, mobile computing and big data.
January 10, 2013