Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: cybersecurity
DoD will hire 1,000 cybersecurity workers a year across all the services over the next few years to build their cyber force.
In the case of a cybersecurity attack, who --if anybody -- should have the power to shut down the Internet. DorobekINSIDER talks with David Silverberg, editor of Homeland Security Today, about who should have the keys to the Internet.
"It's no exaggeration to say that cyber attacks have become a new form of permanent, low-level warfare," says NATO's Secretary General.
Former CIA Director Michael Hayden would like to see the Oval Office have the authority to shut down the Internet.
DHS's Sean McGurk and other cybersecurity experts are trying to protect agency networks against one of the most dangerous viruses ever developed. Stuxnet exploits a vulnerability in Siemens industrial equipment control software and hardware and may be the product of a nation bent on sabotage.
Administration's working group also is looking at policies and regulations that need to be updated. DoD calls on Congressional support when the White House submits its package of legislative changes. Meanwhile, DHS has released a draft of the National Cyber Incident Response Plan.
Cyber security experts are studying a scary new weapon: a software smart bomb.
The Defense Department and its services plan to hire a total of 1,000 cyber professionals each year over the next three years, Gen. Keith Alexander tells a House committee. Alexander said getting the right people in place to move the DoD Cyber Command into an operational stage is among his highest priorities. DoD and the services must look at how best to retain these professionals once they work for the military.
The Defense Department's cyber command will become fully operational on October 1. Federal News Radio's Jason Miller joined DorobekINSIDER with details about how General Alexander believes DoD can overcome the lack of qualified cyber employees.
Touching on the Japan's need to improve preparedness to deal with cyber attacks, Boeing says that the ministry is placing more emphasis on cyber security.