Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: cybersecurity
The OTA Awards program recognizes exceptional and meritorious achievements by companies, non-governmental agencies (NGO) and individuals who demonstrate commitment to preserving and improving online safety for consumers, business and government services. We get more about the how and why from Craig Spiezle with the Online Trust Alliance.
Group tries to build trust in cyberspace, Thumbs up for cyber coordination
White House cyber coordinator says using secure identity cards and working more closely with industry among his top short term priorities. He says a new strategy to secure online transactions also is on track for the President's signature this fall. And he's closely watching Capitol Hill as Senate lawmakers may be close to completing draft of consolidated cyber bill.
Tags: technology , Howard Schmidt , Harry Reid , White House , Information Security and Privacy Advisory Board , HSPD-12 , secure identity management , National Strategy for Trusted Identities in Cybers , Jason Miller
Learn more in today's cybersecurity update.
Long-time privacy and cybersecurity expert to join the government to work on similar issues. EPA's Lisa Schlosser also takes on a new role at her agency.
A new report finds the vast majority of U.S. supply chains rely on information technologies that can be compromised at any time. We get details from Tom Wilkerson, CEO of the Naval Institute.
Cyberthreat report released
Securing cyber-space has become a global challenge, and the GAO has ideas about what agencies can do to be prepared.
One professor explains why DoD needs to be concerned about using social media.
Security Threat Report reveals attitudes to cyberwarfare, Patch or we go public, says bug bounty program