Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: U.S. Cyber Command
The top lawyer for U.S. Cyber Command, Air Force Col. Gary Brown, calls the Stuxnet attack the model of a responsibly conducted cyber attack. Catherine Lotrionte, the executive director of George Washington University's Institute for Law, Science and Global Security joined In Depth with Francis Rose to discuss Stuxnet.
Gen. Keith Alexander, head of both the National Security Agency and U.S. Cyber Command, says defense networks are not defensible from cyber attacks. His plan for getting back on track includes consolidating the number of networks and data centers and moving toward cloud computing.
For a progress report on how the military is combating the cyber threat and a look at the near term future, officials from the Army, Navy and Air Force cyber commands joined the Federal Drive with Tom Temin and Amy Morris for a special Federal News Radio panel discussion.
The Defense Information Systems Agency celebrated the ceremonial opening of its new 95-acre headquarters campus on Friday. Less than half of the 4,600 employees already work at its new headquarters at Fort Meade, Md. The agency expects the rest of its staff to move there from several northern Virginia locations by late August.
Sen. Sheldon Whitehouse (D-R.I.), who led a Senate Intelligence Committee review of cybersecurity policy last year, said he is hopeful that Congress will be able to pass an overhaul of cyber laws this year. Whitehouse has been critical of the pace at which the Obama Administration has moved to propose such changes to lawmakers.
Gen. Keith Alexander, commander of the military's new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA's capabilities without having the spy agency be in charge of security.
Tags: DoD , cybersecurity , technology , Keith Alexander , NSA , DHS , Do William Lynn , privacy , civil liberties , Information Technology Exchange Program , industry , information sharing , Jared Serbu
Invited attendees will join the country's premiere cyber experts from U.S. Cyber Command, the National Security Agency, Defense Information Systems Agency and Department of Homeland Security plus top cyber intelligence officials, defense and commercial industry leaders from Constellation Energy, Federal Reserve, HP, Johns Hopkins Healthcare System, Lockheed Martin, ManTech, SAIC, TASC, TeleCommunication Systems for an interactive discussion with Maryland educators from K-12, colleges and universities and workforce development organizations.
Learn more in today's Cybersecurity update
Pencils down. The code in the Cyber Command logo has been cracked.
Solve the puzzle, win a prize!