Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: cybersecurity
The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.
Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.
The Army's new dedicated career branch for cyber specialties could be up and running as soon as October.
These days, it's only a matter of time before the next data breach occurs. Just ask Home Depot, it could also be your agency. Hackers recently breached HealthCare.gov and installed malicious software. Although the attack took place in July, it took the Health and Human Services Department more than a month to detect it. Claire Giordano is a senior director at Quantum. She joined Tom Temin on the Federal Drive to explain how network forensics can play a critical role in protecting agencies' data.
Booz Allen Hamilton Senior Vice President Brad Medairy, will discuss how Continuous Diagnostics and Mitigation (CDM) can help your agency meet its cybersecurity challenges.
September 9, 2014
Tags: acquisition , contracting , Brad Medairy , Booz Allen Hamilton , Continous Diagnostics and Mitigation , cyber threats , asset management , vulnerability management , predictive intelligence , Roger Waldron , Coalition for Government Procurement , Off the Shelf
Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.
The Army has thousands of personnel working full-time on cyber, but so far, those soldiers have no dedicated career path. That may be about to change.
Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system.
August 26, 2014
Tags: technology , Chris LaPoint , SolarWinds , network management , continuous monitoring , compliance , data center consolidation , cloud computing , Thwack , data analytics , Software Defined Networking , self service automation , John Gilroy , Federal Tech Talk