Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Federal information technology executives are tasked with managing the data inundation and cyber threats they encounter on a daily basis, often with limited resources, both from a budgetary and skilled personnel perspective. Federal News Radio recently spoke with Steve Hull, chief information officer at Leidos, to address these issues and more.
Cybersecurity competitions are drawing more attention from and becoming more popular with federal agencies.
Educational opportunity is the most important motivation government can use to attract cybersecurity talent, even more than pay or mission.
Federal efforts to develop a well-trained cybersecurity workforce are ramping up, due in large part to the edicts of President Donald Trump's cybersecurity executive order.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
Defense information pro Paul DeMennato offers advice about protecting informational systems against insider threats. He said it's more than keeping up to date on patches and monitoring files for human anomalies, it's about getting your staff to buy in to a culture of protecting against insider attacks.
Wayne Belk, co-director of the National Insider Threat Task Force, wants feds to know that insider threat programs are there to protect them, not to get them in trouble.
The OCC uses bank statement data, loan level data, financial market data, economic and legal data to provide the government with both holistic, macroeconomic views and the ability to dive deep into a particular subject.
When you try to make sense of the petabytes of data flowing across your desk you really don’t know what has value. There aren’t enough hours in the day to carefully parse each data set you have responsibility for. The most practical approach is to add some kind of a tool to automate the process.
The Substance Abuse and Mental Health Administration collects data using various methods and sources to identify trends and patterns in the well-being of the American public.
The Food and Drug Administration is saving time on cyber incident responses by integrating its watch desk and engineers within a single command center, and integrating its tools to provide more holistic views of its systems.
The General Services Administration’s Federal Acquisition Service just created the Highly Adaptive Cybersecurity Services Special Item Number (HACSSIN) to add cyber services to GSA’s Schedule 70 to help agencies procure cyber solutions.
The Homeland Security Department’s National Cybersecurity and Communications Integration Center is using new automation technologies to flip the script on script kiddies and black-hat hackers by getting proactive about cyber defense.
Agencies are under the gun to meet the Dec. 31 deadline to manage all permanent and temporary email in an accessible, electronic format. Earlier this year, agencies said they were in good shape to meet that requirement.