bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:59 pm, September 1, 2014

Search Result

Search Tags:  cyber

Jason Miller, Executive Editor, Federal News Radio

House Veterans Affairs Committee members are fed up with repeated cybersecurity problems. They want the VA to improve its cybersecurity once and for all. A new bill tells the department exactly how to do it. The legislation is among the most prescriptive cyber bills that any agency has seen in almost a decade. Federal News Radio Executive Editor Jason Miller shares reactions to the bill with Federal Drive hosts Tom Temin and Emily Kopp. Read Federal News Radio's related article.

Tags: Jason Miller , Federal Drive , Tom Temin , Emily Kopp , VA ,

Friday - 04/04/2014, 10:27am EDT
Listen

Jason Miller, Executive Editor, Federal News Radio

House Veterans Affairs Committee members are no longer asking the Veterans Affairs Department to improve their cybersecurity. They want to tell them how to do it. A new bill introduced Wednesday would be among the most perspective cyber bills that any agency has seen in almost a decade. Federal News Radio's Executive Editor Jason Miller was a guest on In Depth with Francis Rose. In Depth with details on the bill and reaction to it. Read Federal News Radio's related article.

Tags: House , Veteran Affairs , Jason Miller , In Depth ,

Thursday - 04/03/2014, 05:03pm EDT
Listen

John Pescatore, Sans Institute

GSA's cyber dashboard is starting to look a little clearer.

Tags: GSA , Jason Miller , Metrica Team Venture , cyber dashboard , John Pescatore , SANS Institute

Thursday - 03/20/2014, 05:03pm EDT
Listen

Jared Serbu, DoD Reporter, Federal News Radio

U.S. Cyber Command is calling for a higher seat on the military's org chart.

Tags: U.S. Cyber Command , CYBERCOM , Federal Drive

Friday - 03/14/2014, 03:39pm EDT
Listen

Maryland signs cybersecurity agreement with NIST

Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.

Tags: Barbara Mikulski , Isiah Leggett , Patrick Gallagher , NIST , technology

Tuesday - 02/18/2014, 01:20pm EST

Section

Tags: General Dynamics IT , General Dynamics IT Solutions Center ,

Wednesday - 10/02/2013, 04:26pm EDT

What's ahead for contractors?

Deltek's Ray Bjorklund and Kevin Plexico will talk about how contractors will be affected by sequestration and other issues.
November 12, 2012(Encore presentation November 26, 2012)

Tags: acquisition , contracting , Deltek , Ray Bjorklund , Kevin Plexico , sequestration , fiscal cliff , Mark Amtower ,

Monday - 11/12/2012, 07:44pm EST
Listen

The Accidental Insider Threat: Is Your Organization Ready?

Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?

Tags: Raynor Dahlquist , Tom Kellermann , Angela McKay , Michael C. Theis , technology , Booz Allen , Booz Allen Expert Voices , cybersecurity

Tuesday - 09/25/2012, 05:50pm EDT
Listen

Cyber Security: Achieving Cyber Resilience

Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.

Tags: technology , Accenture , cyber security , IT , DoD , cyber crime , ISS , FAA , DHS , Army , CERT , Steven D. Shirley , Michael F. Brown , Army BG Steven W. Smith , Randy Vickers

Wednesday - 01/27/2010, 02:21pm EST
Listen
  • 1
  •