Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Ron Ross
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Tags: technology , cybersecurity , oversight , Kathleen Tighe , Education Department , NIST , Alan Paller , SANS Institute , council of the inspectors general on integrity and and efficiency , Jason Miller
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
For over a decade, experts have been forecasting a shortage in trained cybersecurity professionals. And the demand for those experts continues, even as government and industry notes an uptick in the number and the nature of cyber threats. On this edition of "AFCEA Answers", we get a report card on efforts to educate and train the cybersecurity workforce with Dr. Ron Ross from NIST; Pat Delaney from University of Maryland University College; and Chris May from Carnegie Mellon University's CERT program.
Ron Ross of the National Institute of Standards and Technology wants feedback on the agency's IT security and privacy controls. Deputy Commissioner Wanda Rogers of the Treasury Department's Financial Management Service talks about the final transition to E-Payments. Philip Lohaus is a research fellow with the American Enterprise Institute and former Defense Department analyst who has studied and blogged about how the CIA is two organizations in one.
Tags: Wanda Rodgers , Tom Davis , Philip Lohaus , Sen. Ben Cardin , NIST , Treasury Department , Deloitte & Touche , House Oversight and Government Reform Committee , CIA , Federal Drive , Deloitte & Touche
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Nominees include former White House cybersecurity czar Howard Schmidt, NIST expert Ron Ross and the late government computer security pioneer Lynn McNulty.
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
The National Institute of Standards and Technology has issued a major revision to the Federal Information Security Management Act, which governs agency information security policies. Ron Ross, a NIST fellow and the agency's FISMA implementation project leader, joined In Depth with Francis Ross to discuss the FISMA additions.
All that in today's cybersecurity update.
Ron Ross of NIST returns to talk more about network security.