Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: cybersecurity
Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.
Julie Perkins hosts a roundtable discussion of the latest developments in cybersecurity.
July 11, 2014
Tags: workforce , cybersecurity framework , Cybersecurity executive order , Julie Perkins , Gregory Wilshusen , GAO , Ari Schwartz , John Lainhart , IBM Global Business Services , Alma Cole , The Performance Institute , Fed Talk , Shaw Bransford and Roth
Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."
When it comes to critical infrastructure cybersecurity, White House policy has federal agencies and the private sector joined at the hip. So it matters to the federal government how good the private sector is at cyber. Unisys and the Poneman Institute surveyed companies who operate critical infrastructure. The picture isn't great. Mark Cohn, the chief technology officer of Unisys Federal Systems, joined Tom Temin and Emily Kopp on the Federal Drive to discuss the results of the survey.
It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.
The Senate would like to grant new powers to federal chief information officers and update federal IT laws that haven't gotten much attention for the past dozen years. Those are a couple of the effects of new legislation the Senate Homeland Security and Governmental Affairs approved recently. One of the bills is the Senate version of the Federal IT Acquisition Reform Act -- the other is an update to the Federal Information Security Modernization Act, which Senators have been trying to modify for the past several years, without much success. She said on In Depth with Francis Rose the proposals are a big step in the right direction.
The National Information Assurance Partnership, the U.S. implementation of what was supposed to be a faster, cheaper process to verify the cybersecurity of commercial IT products, turned out to be so slow and expensive that few companies could afford to go through it. But officials said they hope a recent overhaul in the procedures will breathe new life into the program.
The General Services Administration and the Homeland Security Department are putting the final touches on the next set of contracts that will truly kickstart the federal move toward dynamic cybersecurity protections of agency networks and computers. The two agencies will release six task orders under the $6 billion CDM program in the coming year to implement tools and services across more than 40 agencies.
Bill Lay, the State Department's chief information security officer, said his budget for cybersecurity doubled in 2014 to help address the recommendations outlined by the agency's inspector general.