Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: cybersecuirty
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
Tags: technology , Congress , Senate Intelligence Committee , House Intelligence Committee , Mike Rogers , Saxby Chambliss , Dutch Ruppersberger , Keith Alexander , NSA , DHS , Mike McCaul , Jared Serbu
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.
Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.
December 13th at 12pm
Program will discuss Updates & Progress on Emerging Technologies (Cybersecurity-Geospatial-Big Data-Virtualization & Mobility Trends), Best Practices & Benefits of Technologies, Challenges or major hurdles to still overcome, and A Vision for The Future.
The department signs an enterprise license agreement for messaging software for all civilian agency networks as part of the intrusion detection system. Congress gave DHS $443 million for cybersecurity in the 2012 budget.
The White House released the new plan to focus on four broad areas to improve cybersecurity in the government and in the private sector. Howard Schmidt, the White House cyber coordinator, said agencies will issue RFPs and RFIs to meet the strategy's goals.
Agencies, vendors can comment until Friday on the draft standard describing cybersecurity workers. A common definition will help agencies classify who is a cyber worker.
Hackers are sending out malware disguised as a file in an email from security firm Symantec.