Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
A New York judge has refused to grant bail to a Chicago man charged in a conspiracy to hack into corporations and government agencies worldwide.
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
Export-Import Bank President Fred Hochberg explains why his agency had a banner year, with a record number of transactions in fiscal 2012. And a professor at the Wharton School describes how private insurance companies are making money off the National Flood Insurance Program — but taxpayers are likely to pick up the slack when claims surpass premiums.
The Republican leader said today on the Senate floor that after the debates over the DoD and Intelligence authorization bills, lawmakers could address concerns about the Cybersecurity Act of 2012.
The upper chamber fails to move cyber bill out of starting blocks by receiving 60 votes to end cloture. Lawmakers couldn't get past their concerns over the requirement for regulations and DHS' oversight role.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Po Collins of the National Contract Management Association talks ethics. Don Kettl, dean of the school of Public Policy, University of Maryland, sheds light on the election. Craig Karch of ICE talks about the return of antiquities to Mexico. Alexander Bolton of The Hill newspaper and J.David Cox, national president of AFGE, call in about the election.
The Consortium for Cybersecurity Action, a newly-formed international group of government agencies and private organizations from around the world, today will release an updated baseline of the 20 most important cyber controls. The group wants to become a resource to help agencies implement those security checks. DHS already is developing a solicitation to make it easier for agencies to buy tools and services to implement several of the security checks.
Justice IG Michael Horowitz shares findings about what happens to illegal immigrants before they go to immigration court. Plus, how are postal employees faring on the East Coast after superstorm Sandy?
Thousands of IRS computers could be prone to cyber intruders because officials aren't updating software in a timely manner, according to a report from the Treasury Inspector General for Tax Administration.
Terry Edwards, the director of the Office of the Chief Systems Engineer and chief information officer for the assistant secretary for acquisition, logistics and technology, said his office helps acquire technology and ensure standards are met.
November 1, 2012(Encore presentation December 27, 2012)
EPA's 25,000 email users will be fully migrated to the cloud by early 2013 thanks to collaboration solutions provided by Lockheed Martin and Microsoft.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The 18-month study found DoD is no longer the employer of choice for STEM workers, at a time it should be attracting a "high fraction of the highest-quality STEM workforce."
How would the Pentagon change under Mitt Romney? And what would President Obama do to the Defense Department in a second term? Federal Drives talks to advisers to the two candidates about the different approaches to national security.
The Federal Drive with Tom Temin and Emily Kopp hosts a panel discussion on how industry and the government are working together on meeting their shared cybersecurity goals.
Pentagon makes one more plea for a resolution to sequestration. A regular budget, an annual authorization bill and a resolution to the fight over cybersecurity laws would be helpful as well.
Mark Weatherford, DHS deputy undersecretary for cybersecurity, discusses how the National Cybersecurity and Communications Integration Center is at the core of an effort to bring government and industry closer together to respond to threats against critical infrastructure.
October 25, 2012
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
A look at the events shaping cybersecurity policy in the federal government over the past six years.