Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
OMB Controller Danny Werfel explains how agencies have been able to cut improper payments. Also, the VA's Mary Santiago discusses the hurdles to hiring more veterans into the federal workforce.
Sen. Mark Warner (D-Va.) describes the bipartisan support around the DATA Act. Michael Courts of the GAO recaps his testimony on diplomatic security related to the attack on the U.S. consulate in Benghazi. Charles H. Romine of NIST explains how medical professionals can make meaningful use of electronic records.
Tags: Federal Drive , Michael Courts , GAO , Benghazi , Ed Meagher , VA , Legal Loop , Joe Petrillo , contracting , Kathleen Stratton , Pew Charitable Trusts , Charles Romine , technology , Vince Micone , CFC
OPM developing competency models for performance improvement officers and chief operating officers as part of its requirements under the GPRA Modernization Act. DHS moves to agile development to fix the HSIN program. NIST to update HSPD-12 card requirements to meet mobile needs.
Tags: technology , GSA , OPM , DHS , Martha Johnson , Dave McClure , Patsy Stevens , Donna Roy , Jeremy Grant , NSTIC , Suzanne Lightman , Green government , energy efficiency , open government , GPRA Modernization , HSIN , cybersecurity , identity management , mobile , HSPD-12 , Jason Miller , ELC 2011
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Rob Carey , Martin Dempsey , Robert Lentz , Stephen Boutelle , U.S. Cyber Command , defense industrial base , critical infrastructure , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Jared Serbu , Cybersecurity Rising
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
Nobel Prize winner David Wineland of NIST discusses his accomplishments. And a contingent of large federal buildings might be getting a makeover. The National Capital Planning Commission shares plans the GSA is considering.
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
Tags: technology , cybersecurity , Donna Dodson , Andy Ozment , White House , HSPD-12 , continuous monitoring , Trusted Internet Connections , Information Security and Privacy Advisory Board , cross-agency goals , Jason Miller
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
Tags: technology , acquisition , identity management , Tom McCarty , DHS , Kshemendra Paul , Information Sharing Environment , Sharon James , IRS , Naomi Lefkovitz , cloud computing , information sharing , back-end attribute exchange , GSA , PortfolioStat , HSPD-12 , AFCEA Bethesda , ACT-IAC , standards based acquisition model , Jason Miller
John Kasianowicz is the NIST project leader on a project coming up with a cheaper way to test DNA for possible illnesses. GAO's John Hutton says that few agencies are compiling inventories for their service contracts. Procurement attorney Joe Petrillo discusses a new inspector general's report. Dr. Harry Lambright of Syracuse University studied the effectiveness of two former federal officials. David Hall-Matthews talks about a ranking of nonprofits.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Tags: cybersecurity , technology , DHS , NSA , DISA , Peggy Maxon , Roger Greenwell , Charles Clancy , Virginia Polytechnic Institute and State University , Hume Center for National Security and Technology , Jared Serbu , INSA , workforce