Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Senate Intelligence Committee
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
The top U.S. intelligence chief says that budget cuts have jeopardized America's security and safety -- and will only get worse over time.
Sen. Dianne Feinstein (D-Calif.), chairwoman of the Senate Intelligence Committee says she expects the panel to vote later this week on the nomination of John Brennan to be director of the CIA.
House lawmakers voted Monday 373-29 in favor of a Senate-passed bill to slightly boost the president's $72 billion budget request for intelligence agencies, which is still less than last year's $80 billion budget.
The Select Committee on Intelligence member wrote a letter to White House Cyber Coordinator Michael Daniel asking him to make sure any mandate doesn't harm the networks used for interactive computer services.