Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: SANS Institute
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Federal employees are eligible for a free one-day training session in early November on implementing continuous monitoring. The goal is to help agencies make good use of the continuous diagnostics and monitoring contract DHS awarded in August.
DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.
The company says both sites have been scrubbed of malware and vulnerabilities have been closed. The "drive-by" attack that affected the sites is a growing type of cyber hack that looks for holes in popular websites. FederalNewsRadio.com and WTOP.com are available again to users of all Internet browsers.
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Tags: technology , NIST , Patrick Gallagher , DHS , Bruce McConnell , Jane Holl Lute , Michael Daniel , White House , cybersecurity , information sharing , Verizon , U.S. Chamber of Commerce , Alan Paller , Craig Silliman , Jason Miller
The Defense Department plans to boost the ranks of cybersecurity professionals, increasing cyber staff at U.S. Cyber Command by more than five times to some 4,900 employees. But DoD's plan is daunting in more ways than one. The job qualifications and skills needed for the kinds of positions the Pentagon wants are rare and often require years of training and hands-on experience. And even if DoD looks outside the confines of the Pentagon to fill these roles, it's not entirely clear where the new cyber pros would come from.
Alan Paller of the SANS Institute talks about DoD's new initiative to hire 4,000 more people for its Cyber Command. Paul Terry of Blackboard, Inc., discusses how his company is helping GSA with its travel planning. Devon Hewitt, a partner at Protorae Law, weighs in on a recent contract award protest affecting people with disabilities. Capt. Paul Hammer of the Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, talks about the latest efforts at his center. Robin Lineberger of Deloitte LLP fills us in about the Professional Services Council's new commission that's focusing on efficient and innovative acquisition issues.
Tags: Alan Paller , U.S. Cyber Command , cybersecurity , Cybersecurity Update , Paul Terry , GSA , Blackboard , Devon Hewitt , Protorae Law , DoD , DoD Report , Army , accessibility , Paul Hammer , Defense Centers of Excellence for Psychological He , mental illness , Walter Reed Army Medical Center , Robin Lineberger , Deloitte , Professional Services Council , acquisition , Federal Drive
The Consortium for Cybersecurity Action, a newly-formed international group of government agencies and private organizations from around the world, today will release an updated baseline of the 20 most important cyber controls. The group wants to become a resource to help agencies implement those security checks. DHS already is developing a solicitation to make it easier for agencies to buy tools and services to implement several of the security checks.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
Military's cyber leaders say job satisfaction has so far trumped salary concerns when it comes to building and retaining a workforce of elite cyber warriors. Building the capacity of that training pipeline is the next challenge.
Tags: Obama Impact , DoD , cybersecurity , workforce , Alan Paller , Air Force , Michael Basla , Navy , Michael Rogers , Keith Alexander , U.S. Cyber Command , DISA , Henry Sienkiewicz , Roger Greenwell , training , Jared Serbu , On DoD , DoD Report , Cybersecurity Update , Federal Drive