Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: TIC
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , Federal Desktop Core Configuration , FISMA , continuous monitoring , cyber workforce , Jason Miller
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , secure identity cards , HSPD-12 , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Tom Wiesner, Labor's deputy chief information officer, is working on a strategy to bring work contracted out to vendors back in-house.
March 3, 2011
Sean Donelan of the National Protection and Programs Directorate at DHS talks more about it.
The current set of categories is seven-years-old and has not kept up with the changing cybersecurity environment, says Mischel Kwon, director of U.S.-Cert.
This is the first publicly announced award under the GSA Networx program to meet the Trusted Internet Connections initiative. FTC will receive intrusion detection, intrusion prevention and other cybersecurity services under the $5 million deal. GSA and OMB pushing agencies to transition to the telecommunications contract more quickly.
Agency offering to help others transition to new telecommunications contract in any way possible. Only 28 percent of all agency services have moved to Networx so far.
Tags: contracting , technology , Karl Krumbholz , GSA , Energy , DOT , DoL , State , USDA , SSA , Treasury , IAC , AT&T , Verizon , Qwest , Networx , Connections , telecommunications , cybersecurity ,
Mark Forman, a partner with KPMG and former Administrator for E-Government and Information Technology at the Office of Management and Budget, explains.
Secretary Napolitano reorganizes how the agency oversees IT security. It's now more of a ‘command and control structure.'
Tags: technology , management , Janet Napolitano , Phil Reitinger , Sean Donelan , DHS , Secret Service , DoD , Information Security and Privacy Advisory Board , cybersecurity , Cyber Command , Security line of business