Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Ron Ross
Listen Tuesday August 19th @ 12pm
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Tags: technology , cybersecurity , oversight , Kathleen Tighe , Education Department , NIST , Alan Paller , SANS Institute , council of the inspectors general on integrity and and efficiency , Jason Miller
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
For over a decade, experts have been forecasting a shortage in trained cybersecurity professionals. And the demand for those experts continues, even as government and industry notes an uptick in the number and the nature of cyber threats. On this edition of "AFCEA Answers", we get a report card on efforts to educate and train the cybersecurity workforce with Dr. Ron Ross from NIST; Pat Delaney from University of Maryland University College; and Chris May from Carnegie Mellon University's CERT program.
Ron Ross of the National Institute of Standards and Technology wants feedback on the agency's IT security and privacy controls. Deputy Commissioner Wanda Rogers of the Treasury Department's Financial Management Service talks about the final transition to E-Payments. Philip Lohaus is a research fellow with the American Enterprise Institute and former Defense Department analyst who has studied and blogged about how the CIA is two organizations in one.
Tags: Wanda Rodgers , Tom Davis , Philip Lohaus , Sen. Ben Cardin , NIST , Treasury Department , Deloitte & Touche , House Oversight and Government Reform Committee , CIA , Federal Drive , Deloitte & Touche
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Nominees include former White House cybersecurity czar Howard Schmidt, NIST expert Ron Ross and the late government computer security pioneer Lynn McNulty.
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.