Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: U.S. Cyber Command
U.S. Cyber Command is putting together dozens of groups to defend the military's network, to work with combatant commanders on offensive tactics and to respond to attacks against the nation. Gen. Keith Alexander, however, said budget cuts will delay DoD's ability to recruit and train team members.
Sen. Chuck Grassley (R-Iowa) is concerned new regulations may make whistleblowers even more reluctant to report tax fraud to the IRS. OMB Controller Danny Werfel says $85 billion in cuts under sequestration would hurt every state. Maj. Gen. Brett Williams says the U.S. Cyber Command is trying to figure how to normalize operations alongside air, land and sea capabilities. Lynn Singleton, director of environmental services at Lockheed Martin, talks about helping agencies move their email to the cloud. Dr. Milton Corn explains why The National Library of Medicine is monitoring social media.
Tags: Chuck Grassley , Senate , IRS , whistlelower , Danny Werfel , OMB , sequestration , Brett Williams , Lynn Singleton , Lockheed Martin , industry , cloud , Milton Corn , National Library of Medicine , National Institutes of Health , cybersecurity , Cybersecurity Update , DoD , DoD Report , Federal Drive
Administration officials and lawmakers say America is losing an aggressive cyber-espionage campaign waged from China.Both sides agreed to push legislation that would make it easier for the government and industry to share information about who is getting hacked and what to do about it.
The Defense Department plans to boost the ranks of cybersecurity professionals, increasing cyber staff at U.S. Cyber Command by more than five times to some 4,900 employees. But DoD's plan is daunting in more ways than one. The job qualifications and skills needed for the kinds of positions the Pentagon wants are rare and often require years of training and hands-on experience. And even if DoD looks outside the confines of the Pentagon to fill these roles, it's not entirely clear where the new cyber pros would come from.
Alan Paller of the SANS Institute talks about DoD's new initiative to hire 4,000 more people for its Cyber Command. Paul Terry of Blackboard, Inc., discusses how his company is helping GSA with its travel planning. Devon Hewitt, a partner at Protorae Law, weighs in on a recent contract award protest affecting people with disabilities. Capt. Paul Hammer of the Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, talks about the latest efforts at his center. Robin Lineberger of Deloitte LLP fills us in about the Professional Services Council's new commission that's focusing on efficient and innovative acquisition issues.
Tags: Alan Paller , SANS Institute , cybersecurity , Cybersecurity Update , Paul Terry , GSA , Blackboard , Devon Hewitt , Protorae Law , DoD , DoD Report , Army , accessibility , Paul Hammer , Defense Centers of Excellence for Psychological He , mental illness , Walter Reed Army Medical Center , Robin Lineberger , Deloitte , Professional Services Council , acquisition , Federal Drive
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S. Cyber Command.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Rob Carey , Martin Dempsey , Robert Lentz , Stephen Boutelle , defense industrial base , critical infrastructure , NIST , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Jared Serbu , Cybersecurity Rising
A look at the events shaping cybersecurity policy in the federal government over the past six years.