Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: security
National Security Correspondent JJ Green speaks with Army Reserve Lt. Col. Tony Shaffer, who explains the strategy the US has been using against Taliban.
National Security cyberattack concerns are high, Report: China-based hackers stole India secrets
A new report finds the continued lack of information sharing between federal, state, and local agencies puts the US at risk of terrorist attack and emerging national security threats. We get details from former Senator Slade Gorton (R-WA.) who co-authored the testimony.
The 2010 Olympic Security Coordination Center will organize and direct the security efforts of over 40 federal, state and local agencies. Developed over the last four years by the 2010 Olympics Security Committee, which includes U.S. federal, state, local and Canadian security, intelligence, emergency management, defense, and public health agencies, this center was recommended by a Department of Homeland Security study in 2007. The Vancouver Olympic venues are located in close proximity to the border and adjacent to major U.S. shipping ports and other critical infrastructure.
Achieving effective cyber deterrence by denial, or defense in-depth, will require nothing short of a total paradigm shift from both government and the private sector.
Is al Qaida eyeing U.S. cyber weaknesses?