Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: TIC
The White House released updated progress report on the cross-agency cybersecurity goals and found most agencies improved. The administration said more agencies are using smart cards to log onto their networks and more are implementing continuous monitoring.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , Cybersecurity , Paul Nicholas , Microsoft , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , Cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , secure identity cards , HSPD-12 , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Tom Wiesner, Labor's deputy chief information officer, is working on a strategy to bring work contracted out to vendors back in-house.
March 3, 2011
Sean Donelan of the National Protection and Programs Directorate at DHS talks more about it.
The current set of categories is seven-years-old and has not kept up with the changing cybersecurity environment, says Mischel Kwon, director of U.S.-Cert.
This is the first publicly announced award under the GSA Networx program to meet the Trusted Internet Connections initiative. FTC will receive intrusion detection, intrusion prevention and other cybersecurity services under the $5 million deal. GSA and OMB pushing agencies to transition to the telecommunications contract more quickly.
Agency offering to help others transition to new telecommunications contract in any way possible. Only 28 percent of all agency services have moved to Networx so far.
Tags: contracting , technology , Karl Krumbholz , GSA , Energy , DoT , DoL , State , USDA , SSA , Treasury , IAC , AT&T , Verizon , Qwest , Networx , Connections , telecommunications , Cybersecurity ,
Mark Forman, a partner with KPMG and former Administrator for E-Government and Information Technology at the Office of Management and Budget, explains.