Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: insider threat
From Google searches to LinkedIn connections, a wealth of publicly available online information can reveal a person's mindset, and possibly tip off the government to the next Edward Snowden or Aaron Alexis. The intelligence community has done some testing, but a final policy remains elusive. Contractors are hesitant.
Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.
It's hard to tell how many agencies are actually checking all the boxes on the Obama administration's plan for detecting disgruntled or rogue employees. Agencies were supposed to have taken initial steps to set up insider threat programs by June 30, according to an update posted on Performance.gov. But it's impossible to know the number of agencies who met the initial criteria so far. The progress update says that information is classified.
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
Tags: management , Beth Cobert , OMB , John Fitzpatrick , NARA , information sharing , Patrick Kennedy , State Department , NSA , Keith Alexander , Ed Hammersla , Raytheon , CA Technologies , Bill Harrod , Intelligence National Security Alliance , Dawn Cappelli , Rockwell Automation , Trust Redefined: Reconnecting Government and its Employees , Jason Miller
Everyday behavior of your coworkers could be a sign of a looming insider attack. A new report explains what to watch out for and how agencies can try and predict the next threat.
The government is on high alert for insider threats. From shootings on military base to cybersecurity leaks, it may seem like your officemate could turn into your agency's worst nightmare. Agencies struggle with appropriate ways to migrate threats. Mike Gelles, a former chief psychologist for the Naval Criminal Investigative Service and now with Deloitte, talked about the threats with Federal Drive hosts Tom Temin and Emily Kopp.
Through the back-end attribute exchange, agencies can have a standard way for different organizations to safely and securely share sensitive information. The Justice Department conducted a pilot earlier this year and found success with state and local law enforcement agencies accessing the Regional Information Sharing System.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , FOSE , Jason Miller
Hord Tipton, the executive director of ISC2 and the former chief information officer at the Interior Department, joined In Depth with Francis Rose to discuss the "red flags" managers should look for in the hiring process.
Linda Springer, a former controller at the Office of Management and Budget, joined In Depth with Francis Rose to discuss what steps agencies should take to detect and root out insider fraud.