Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: secure identity cards
Program to provide identification cards for maritime workers lags behind a similar DoD effort, and is causing decade-long problems.
Tags: House , House Transportation and Infrastructure Committee , John Mica , TSA , port security , TWIC , Transportation Worker Identification Credential , Coast Guard , Stephen Sadler , Keith BieryGolick
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , HSPD-12 , Continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.
Tags: DoD , Congress , technology , information sharing , State Department , Director of National Intelligence , James Clapper , Teri Takai , Corin Stone , Patrick Kennedy , WikiLeaks , Joseph Lieberman , Susan Collins , Senate Homeland Security and Governmental Affairs , identity management , CACs , public key infrastructure , SIPRNet , Jared Serbu
The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.
New regulations published Thursday aim to make sure agencies reclaim vendor employees' HSPD-12 cards when they're no longer needed to perform contract work.
The military is performing a proof of concept in Utah by putting transit benefits on employees' Common Access Cards. USDA is implementing technology to require the use of HSPD-12 cards to log onto applications.