Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Technology
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , identity management , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
How are agencies tackling the threats and vulnerabilities inherent in today's technology dependent government?
Continuous monitoring provides nearly real-time information in the face of cyber attacks and is essential for senior leaders making ongoing risk-based decisions that affect critical mission and business functions. OMB mandates and NIST guidelines require agencies to establish oversight mechanisms to evaluate systematically and ensure the continuing security, interoperability, and availability of systems and agency data. Tune into this interactive discussion to learn about the current state of risk management and how agencies are using continuous monitoring to maintain situational awareness of information security and organizational risk.
Some government agency websites were essentially turned off Tuesday morning, as the shutdown officially got underway. Agencies also began sending out messages via social media alerting followers that accounts would not be updated during the shutdown.
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
OMB and GSA put out separate memos detailing steps agencies should take during a government shutdown, including "turning off" certain government websites. OMB reminded agencies to secure systems and offered advice on how to deal with third-party social media sites. GSA gave agencies ideas to minimize the impact of having to shutdown websites.
The Homeland Security Department chose 15 large businesses to provide technology development, implementation and maintenance services under the EAGLE II multiple award contract.
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
Al Tarasiuk, the chief information officer of the Office of the Director of National Intelligence, took over the systems integration role for the intelligence community IT Enterprise (ICITE) program after progress slowed.
September 26, 2013
Treasury's Office of Financial Innovation Transformation (OFIT) issued a draft set of requirements that agencies must meet if they want to be federal shared services providers. The requirements should be finalized this fall, and a new set of providers will be in place in the coming months.