Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: continuous monitoring
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Tags: cybersecurity , technology , timeline , Cybersecurity Rising , DoD , OMB , U.S. Cyber Command , U.S. Cyber Challenge , FISMA , Common Access Card , Continuous monitoring , Howard Schmidt , Stuxnet
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , Karen Evans , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , Continuous monitoring , Cyber Workforce , Jason Miller
The draft solicitation asks for 15 toolsets and 11 service areas to help agencies implement continuous monitoring as-a-service and to buy sensors. DHS has asked vendors on GSA Schedule 70 to comment on the requirements.
White House senior director for cybersecurity Andy Ozment said budget folks are getting a better understanding of why cybersecurity is important thanks to the administration's high- priority governmentwide goals. NIST also is helping push the cross-agency goals forward from a technical perspective.
Tags: technology , cybersecurity , Donna Dodson , NIST , Andy Ozment , White House , HSPD-12 , Continuous monitoring , Trusted Internet Connections , Information Security and Privacy Advisory Board , cross-agency goals , Jason Miller
The annual reporting memo gives agencies 57 questions and answers as they prepare their 2012 cybersecurity report.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Homeland Security releases policy and guidance on how departments and vendors will implement continuous monitoring and get away from static reports on the cyber health of their systems. DHS is hoping Congress approves a $200 million funding request to buy five different commercial cyber tools, a dashboard and a security data warehouse in 2013.
Tags: technology , acquisition , contracting , industry , DHS , cybersecurity , John Streufert , Continuous monitoring , FISMA , cloud computing , FedRAMP , Alan Paller , SANS Institute , Jason Miller