Students are gathered in Washington to show off their chops in defending virtual networks and mobile devices. They're facing off against teams of professional aggressors. Middle and high-school aged finalists make up 28 teams in the seventh CyberPatriot National Finals. Retired Air Force Brig. Gen. Bernie Skoch is the Commissioner of CyberPatriot National. He joined Tom Temin on the Federal Drive with the latest on the finals.
Jeff Wagner, OPM's director of IT security, said by detailing specific processes, his organization can protect the network in near real-time and ensure threats or vulnerabilities do not put the entire infrastructure at a greater risk.
A National Weather Service employee accused of illegally accessing a restricted federal computer database containing information about the nation's dams, stealing information and lying to federal investigators will have charges against her dismissed if a judge approves the prosecution's request.
Washington Technology Editor in Chief Nick Wakeman joins host Mark Amtower to discuss the top contracting stories in 2014, and what's ahead for contractors in 2015. March 9, 2015
Terry Halvorsen, a former Navy CIO, assumed the role of permanent CIO on Sunday, according to a Pentagon spokesperson.
The FAA has taken some steps to help protect its air traffic control systems from hackers and cyber criminals. But there's still work to be done. That's according to a new report from the Government Accountability Office. Some of the weaknesses were new, like identifying and authenticating users. Other date back years. Greg Wilshusen, the director of Information Security Issues at GAO, joined Tom Temin on the Federal Drive with more on what the report found.
Lance James, head of cyber intelligence at Deloitte, will discuss the evolution of the cyber intelligence field, and how that is forcing the government and private companies to change how they protect themselves from cyber attacks. March 6, 2015
By JACK GILLUM and TED BRIDIS Associated Press WASHINGTON (AP) — A House committee investigating the Benghazi, Libya, attacks issued subpoenas Wednesday for the emails of Hillary Rodham Clinton, who used a private account exclusively…
Van Hitch, senior advisor with Deloitte's Federal Consulting Practice, joins host Roger Waldron to talk about some of the IT acquisition challenges facing federal managers. March 3, 2015
Cybersecurity incidents are up 15 percent over the past year. So now the Office of Management and Budget is ramping up pressure on your agency to develop and use smart identification cards for employees. Randy Vanderhoof, executive director of the Smart Card Alliance, tells In Depth with Francis Rose about the ways to stay on top of OMB's smart card guidance.
The OMB E-Gov Cyber unit will prioritize those agencies that have struggled to implement two-factor authentication for CyberStat reviews. Only 41 percent of federal civilian agencies are using HSPD-12 cards to log on to networks and computers.
The Homeland Security Department and the General Services Administration handed out the first of seven awards under the continuous diagnostics and mitigation program. DHS will implement tools and services to improve its cybersecurity under the CDM program. In his biweekly feature, "Inside the Reporter's Notebook," Jason Miller writes about this award and the next ones on tap. He joined producer Shefali Kapadia on the Federal Drive with Tom Temin to discuss the DHS awards and other happenings in the federal IT community.
Knowledge Consulting Group will implement tools and services from three vendors on the Homeland Security Department's network.
Joe Paiva, the CIO at the International Trade Administration in the Commerce Department, said using a cloud encryption gateway helps protect data from the insider threat. Other agencies, such as ATF, focus on personnel security clearances to ensure their information is protected.
DHS officials tell Congress that while liability protections are key to encouraging companies to share cyber threat data with federal agencies, the department must also work to earn their trust. It must also work through a "policy puzzle" regarding roles and responsibilities surrounding information sharing.