Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: cybersecurity
Learn more in today's Cybersecurity Update
The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems.
The National Cybersecurity Protection System is testing software and hardware from the Defense Department and industry to figure out how to expand the Einstein toolset. DHS reports that 13 of 19 major agencies already have installed Einstein 2. The department also is planning to hold an industry day for a classified cyber RFI.
Learn more in today's cybersecurity update
Spammers exploit second Facebook bug
September 22nd at 11 AM
Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure.
This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.
Also, is Defense cybersecurity spending asymmetrical?
CBP lax in controlling cybersecurity
learn more in today's cybersecurity update
If you don't want employees in your agency to use a USB device, you can install an agent on the laptop that'll block any communication with a USB device. It is one example of a Data Leak Prevention tool, which can help you define the data you're trying to protect from threats within your own network. But that also means you have to know exactly what data it is that you WANT to protect. Khalid Kark of Forrester Research says if you don't know, you can't define it and the DLP tools can't work.