Lance James, head of cyber intelligence at Deloitte, will discuss the evolution of the cyber intelligence field, and how that is forcing the government and private companies to change how they protect themselves from cyber attacks. May 29, 2015
Naval warfighters have new technology now to help it face a growing body of new threats. Peter Morrison and his team built the laser weapons system. It\'s faster to install and safer and cheaper to use than other missiles. The Navy says each laser costs less than a dollar a shot. Morrison, a program officer for the Navy Department\'s Office of Naval Research, is a finalist for a Service to America medal in the national security and international affairs category. He tells In Depth with Francis Rose why the laser is different than other weapons systems.
Technology may not be the roadblock to the biggest cyber problems your agency has. The trouble may be in the acquisition shop. Richard Stiennon, chief research analyst for IT Harvest and author of \"Surviving Cyberwar.\" His new book, \"There Will Be Cyber War,\" will be out this summer. He tells In Depth with Francis Rose why there is some good news in the cyber realm, but there\'s some bad news too.
The Veterans Affairs Department already faces more than 1 billion attempted cyber attacks a month. But as the complexity and volume of cyber threats increases across the government, VA\'s IT officials are starting to prepare for a worst case scenario. Federal News Radio\'s executive editor Jason Miller joined Tom Temin on the Federal Drive with details on how VA hopes to keep its mission services going in the face of 2 billion or 3 billion attacks a month.
With its networks and systems facing upwards of 1 billion attacks a month, the Veterans Affairs Department is bringing together cyber and mission owners to discuss its courses of action if the situation becomes worse. The agency also is looking to its digital services team to make across-the-board improvements to its online applications.
Commentary: Andrea Little Limbago, a principal social scientist at Endgame, argues for a new type of cyber framework to help public and private sector organizations prepare for and better respond to attacks.
Stephen Warren, the Veterans Affairs Department\'s chief information officer, said he\'s brought in extra vendors to deal with a backlog of cyber challenges. VA\'s inspector general found more than 9,000 outstanding system security risks in its annual Federal Information Security Management Act (FISMA) report.
The U.S. Computer Emergency Readiness Team will begin using two emerging technical specifications to automate how cyber threat information is shared with the public and private sectors.
Inspectors general would have the power to subpoena former feds and contractors to testify in cases of fraud or waste of more than $100,000, or when criminal activity is suspected.
Despite significant investments in cybersecurity, the government\'s current state of readiness leaves a lot to be desired. That\'s according to security managers themselves, responding to the latest survey from ISC2. Dan Waddell, director of government affairs for the National Capital Region of ISC2, joined Tom Temin on the Federal Drive with more on the Global Information Security Workforce Study.
Is patience running short among agencies over the Homeland Security Department\'s continuous diagnostics and mitigation (CDM) program?
Defense Secretary Ash Carter looks to Silicon Valley for help with its new cyber strategy. But Carter doesn\'t have too much time to get the partnership off the ground before the Obama administration leaves and another one takes its place. Steve Grundman, George Lund fellow at the Atlantic Council and former deputy defense undersecretary for industrial affairs and installations, tells In Depth with Francis Rose why Carter should focus on the wins he can earn now.
The National Institute of Standards and Technology is bringing these concepts together in a new document to help improve cyber defense and resilience. Ron Ross, a fellow at NIST, said moving cybersecurity closer to the mission decision-makers will help solve a fundamental flaw in how agencies protect systems and data.
Emile Monette, senior advisor for Resilience and Cybersecurity at the General Services Administration, joins host John Gilroy to discuss how to make the acquisition process safer and more effective. May 12, 2015
The Chief Information Officer\'s Council held a séance, pulled out its Ouji board and asked for the approval from Rip Van Winkle to raise the United States Government Configuration Baseline (USGCB), otherwise known as the Federal Desktop Core Configuration, from its long slumber.