Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: cyber crime
The Defense Department is taking submissions for its 12th annual Cyber Crime Conference. The conference is sponsored by DoD's Defense Cyber Crime Center (DC3). Planners expect more than 200 speakers and 20 different track sessions. Participants from agencies, universities and industry are invited to share ways to prevent cyber crime. Submissions for research abstracts are due by July 6th.
The ceiling value on the contract is $454 million. Most of the work will be located in Linthicum, Md., at at DC3 headquarters.
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.
Assistant Director, FBI Cyber Crime Division
Oct. 15, 2009
More than 100 people have been arrested or charged in the U.S. and the U.K. as part of an alleged global cyber-crime ring, The Wall Street Journal reports.
Thursday, June 17th
The sophistication of security breaches of federal information systems and reports of improper access to these systems continues to grow at an alarming rate. Clearly, there is concern about and a desire to improve the security of these critical infrastructures. So where and how do we begin to effectively safeguard today's systems from cyber threats and increasing system vulnerabilities? c
While the Washington area may be tops when it comes to cyber criminals, our region is also a home to a growing number of cyber defenders-in-training.
On a per capita basis, the District has the most cyber crooks. Maryland ranks 19th and Virginia 28th.
Wednesday, November 11th, 2009 at 2:05pm
Identity Theft is a multifaceted problem that has grown to epidemic proportions with the development of the internet and of the on-line economy.
Tags: technology , Booz Allen Hamilton , Booz Allen Distinguished Speaker Series , Kathleen Walter , IRS , Richard Power , CyLab , Carnegie Mellon University , Calivin Sneed , Blue Cross Blue Shield Association , Kennethe Jenkins , US Secret Service , identity theft