Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Technology
A forthcoming Pentagon plan will let military departments chart their cloud procurement strategies, as long as they provide detailed data to the Pentagon and each other.
Allen Harper, vice president and chief hacker for Tangible Security will discuss how his company is helping federal agencies with their cybersecurity challenges.
September 23, 2014
Tags: technology , Allen Harper , hacking , Tangible Security , cybersecurity , penetration testing , advanced persistent threats , zero day threats , IT security , Red Hat , grey hat , white hat , script kiddies , John Gilroy , Federal Tech Talk
Steve VanRoekel isn't the only one leaving the E-Government office.
The FBI will channel more people and resources into its Pittsburgh office. It's a reward for the cybersecurity team that's credited for catching five Chinese military leaders stealing trade secrets, and a Russian-based cyber crime ring that stole about $100 million from banks around the world. Michael McKeown is supervisory special agent for the Associate Division Counsel, part of the FBI Cyber Initiative and Resource Fusion Unit based in Pittsburgh. On In Depth with Francis Rose, he explained the cybersecurity effort that earned the extra resources.
VanRoekel will advise the agency's senior leadership on using technology and data to help coordinate the government's response to the crisis. This is his second stint at USAID. Lisa Schlosser will be the interim federal CIO.
After two years of planning and pilot programs, the intelligence community says its plan to integrate the IT systems of its 17 agencies is moving forward toward large-scale adoption.
Marilyn Tavenner, the Centers for Medicare and Medicaid Services administrator, promised House lawmakers Thursday that the site would be better protected when open enrollment begins in two months. The recent attack on the HealthCare.gov didn't succeed in stealing any data, DHS says. But some lawmakers say a year into the Affordable Care Act, the website still has basic cybersecurity challenges that should have been fixed.
The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.
Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.