Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: critical infrastructure
NIST issues the industry-developed final draft approach to help critical infrastructure providers secure their computer systems. The agency is accepting comments over the next couple of months and will issue a version 1.0 of the framework in February. Industry offered mixed reactions to the framework. Some said it's too broad while others said it provides a set of agreed upon basic cyber protections.
Last month the Homeland Security Department published its updated National Infrastructure Protection Plan, a governmentwide framework for securing critical infrastructure on a wide scale. The aim of the updated plan is to make all sectors of critical infrastructure more "resilient" -- better able to absorb and recover from natural disasters, terrorist attacks, cyber intrusions and other adverse conditions.
Most people don't think about critical infrastructure until the power goes out, or fresh drinking water doesn't flow from the tap. But the federal government has mapped out a plan with the help of industry, to safeguard the nation's critical infrastructure. On this edition of "AFCEA Answers", we'll discuss the nuances of the newly-released National Infrastructure Protection Plan with Suzanne Spaulding, the acting Department of Homeland Security Undersecretary for the National Protection and Programs Directorate; and Jill Singer, a partner with Deep Water Point consulting in McLean, Virginia.
On this week's Capital Impact show, Bloomberg Government analysts will examine NIST's preliminary cybersecurity framework, and Google's lobbying efforts.
November 7, 2013
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.
President Obama's recent executive order directing that cyber threat information be shared more broadly with the private sector risks making the data less useful to the intelligence agencies that gather and process it. But the risk is worth the potential reward.
Pentagon makes one more plea for a resolution to sequestration. A regular budget, an annual authorization bill and a resolution to the fight over cybersecurity laws would be helpful as well.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012