Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: information sharing
The two agencies met this week to figure out how best to implement the recommendations in a white paper from ACT-IAC. The approach detailed in the document follows closely the methodology used to develop the NIEM and FICAM standards.
Debora Plunkett, the director of the National Security Agency's Information Assurance Directorate, said there is good news and bad news when it comes to protecting the U.S. from cyber threats on a daily basis. In an exclusive interview for Federal News Radio's Agency of the Month program, Plunkett said getting the nation's networks to a higher level of security is multifold.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
Federal News Radio polled current and former federal cybersecurity experts for their opinion on what were the most significant accomplishments since 2006 to secure federal networks and improve public-private partnerships. The list blends suggestions of more than 10 authorities on federal cybersecurity. The accomplishments are in no particular order.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
Tags: technology , acquisition , identity management , Tom McCarty , DHS , Kshemendra Paul , Information Sharing Environment , Sharon James , IRS , Naomi Lefkovitz , NIST , cloud computing , back-end attribute exchange , GSA , PortfolioStat , HSPD-12 , AFCEA Bethesda , ACT-IAC , standards based acquisition model , Jason Miller
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
Tags: technology , Congress , cybersecurity , National Security Agency , U.S. Cyber Command , Keith Alexander , House Intelligence Committee , Mike Rogers , CISPA , Jared Serbu , U.S. Chamber of Commerce
The Environmental Protection Agency partnered with the Commerce Department and National Archives to launch a new online portal aimed at streamlining the Freedom of Information Act request process for both the public and federal agencies.
The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.
Tags: technology , industry , cybersecurity , INSA , Michael Daniel , White House , DHS , DoD , defense industrial base companies , Terry Roberts , Mike Rogers , House Intelligence Committee , Jason Miller