Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: secure identity cards
Program to provide identification cards for maritime workers lags behind a similar DoD effort, and is causing decade-long problems.
Tags: House , House Transportation and Infrastructure Committee , John Mica , TSA , port security , TWIC , Transportation Worker Identification Credential , Coast Guard , Stephen Sadler , Keith BieryGolick
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , Management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , HSPD-12 , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.
Tags: DoD , Congress , technology , information sharing , State Department , Director of National Intelligence , James Clapper , Teri Takai , Corin Stone , Patrick Kennedy , WikiLeaks , Joseph Lieberman , Susan Collins , Senate Homeland Security and Governmental Affairs , identity management , CACs , public key infrastructure , SIPRNet , Jared Serbu
The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.
New regulations published Thursday aim to make sure agencies reclaim vendor employees' HSPD-12 cards when they're no longer needed to perform contract work.
The military is performing a proof of concept in Utah by putting transit benefits on employees' Common Access Cards. USDA is implementing technology to require the use of HSPD-12 cards to log onto applications.