Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: cyber security
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.
They are back online now, but it was a tough week for the U.S. Marshals Service. A good old fashioned computer virus infected the agencies' PCs. That forced officials to disconnect them from the Internet for a few days while the tech staff performed a clean out and upgrade. Turns out that for the Marshals, only 140 machines were affected. But the incident reinforced the basic cyber security advice: Keep your anti-virus software updated. I'm Tom Temin.
Watch or listen to this program on demand below
Program discusses the progress on CyberSecurity with the DHS-DoD & ODNI.
Tags: technology , Federal Executive Forum , DHS , DoD , ODNI , cyber , security , Greg Schaffer , Dave Wennergren , Priscilla Guthrie , Lee Holcomb , Robert Dix , Tom Conway , McAfee , Juniper Networks
Tags: technology , Federal Executive Forum , DHS , DoD , FAA , cyber , security , Robert Lentz , Greg Schaffer , Dave Bowen , Fred Newberry , Cisco , John Bordwine , Symantec , Sam Chun , EDS , Jim Flyzik , Flyzik Group
October 26th, 2009
HP to Buy Cyber Security Company, Adobe Flash under attack
The federal government exploits social media users' desire for online popularity to gain access to private information, a digital civil liberties watchdog group says.
In 2008, there were 360 security breaches on databases containing information on Virginia residents alone.
Governments the targets of a quarter of all cyberattacks, Microsoft retracts fix for Windows 2000 bug