Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Rod Turk
Inside the Reporter's Notebook: Category management launches five pilots; more vendor past performance data
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Tags: Inside the Reporters Notebook , Jason Miller , Defense Intelligence Agency , DoE , Commerce , Mike Maraya , cybersecurity , Grant Schneider , Sydney Smith-Heimbrock , Marie Davie , Marty Jennings , Tom Sharpe , Dick Ginman , Alan Chvotkin , GSA , OFPP , category management , Lesley Field , Past performance , technology , people , acquisition , Professional Services Council
The Continuous Diagnostics and Mitigation (CDM) program was created to provide agencies visibility into their networks to identify any cyber flaws and remediate them in a swift and streamlined approach. Though many agencies have already implemented a number of security tools, they still may lack a method for aggregating and analyzing the collective data for a holistic picture of their security posture. The CDM initiative is aimed at getting all civilian agencies the proper tools to improve vulnerability management, manage hardware and software assets, and ensure the proper security configurations are in place.
Listen Tuesday June 10th @ 12pm
Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.
This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.
On the In Depth show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
Spring townhall talks best practices and successes