Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: continuous monitoring
Is your agency coping with identifying and protecting against the constant barrage of sophisticated cyber threats, while at the same time, trying to improve your FISMA scores? From reduced resources (budget, manpower and unified vision), to lack of an automated risk mitigation capabilities, these factors continue to impact civilian agency FISMA scores. WTOP brings together a panel of network security experts to explore the challenges civilian agencies face in dealing with critical cyber security concerns, and discuss how to coordinate defenses, leverage advanced tools and take advantage of CDM programs to help agencies tackle these issues. The White House has emphasized the need for continuous monitoring since 2010, and as part of the FY13 Homeland Security Appropriations Bill, DHS is to assist other federal agencies in enhancing their cybersecurity efforts. The CDM initiative gives participating agencies the means to implement continuous monitoring as a service (CMaaS), which is a bundled solution comprised of systems, sensors, risk- status displays and professional consulting services.
The White House released updated progress report on the cross-agency cybersecurity goals and found most agencies improved. The administration said more agencies are using smart cards to log onto their networks and more are implementing continuous monitoring.
Three Department of Homeland Security components are testing how ongoing authorizations work. The Office of Management and Budget is drafting a memo to require agencies to change from approving the cybersecurity of systems every three years to a more regular oversight schedule.
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , Cyber Workforce , Jason Miller
The draft solicitation asks for 15 toolsets and 11 service areas to help agencies implement continuous monitoring as-a-service and to buy sensors. DHS has asked vendors on GSA Schedule 70 to comment on the requirements.