Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: U.S. Cyber Challenge
The Federal Acquisition Regulation gets in the way of innovative information technology acquisition in government, according to many industry leaders and even some agency IT leaders. Some experts believe the FAR can be, and should be, your friend for innovative procurement. A panel of experts addressed that idea at NextGov Prime 2014 with Dave McClure of the Veris Group, Joanne Woytek of NASA SEWP, Jaymie Durnan of the Defense Department and Karen Evans of the US Cyber Challenge. McClure tells Federal News Radio's Francis Rose how the process that exists now is perceived.
Karen Evans, former administrator of the Office of Electronic Government and Information Technology and now the national director of U.S. Cyber Challenge, helps "In Depth" host Francis Rose count down the top federal news stories of the week.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
The U.S. Cyber Challenge's annual cybersecurity camp program is now underway. It will run through July 20. Invited participants will go through four days of intensive training aimed at assessing and recruiting top cybersecurity talent.
The International Informations Systems Security Certification Consortium, Inc. — or (ISC)2 &mdashl; has awarded five scholarships as part of a cybersecurity challenge for high schoolers. The organization works with the U.S. Cyber Challenge, a national public-private coalition.
The U.S. Cyber Challenge will offer programs to encourage high school and college students with a knack for computers, mathematics and science to consider careers in IT security.
A new program will target high school students in the government's search for the next generation of cyber warriors. Lawmakers hope the U.S. Cyber Challenge will help attract and train much needed experts in cybersecurity.