Cybersecurity

  • John Kasianowicz is the NIST project leader on a project coming up with a cheaper way to test DNA for possible illnesses. GAO's John Hutton says that few agencies are compiling inventories for their service contracts. Procurement attorney Joe Petrillo discusses a new inspector general's report. Dr. Harry Lambright of Syracuse University studied the effectiveness of two former federal officials. David Hall-Matthews talks about a ranking of nonprofits.

    October 09, 2012
  • Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.

    October 08, 2012
  • The Homeland Security Advisory Council Task Force on Cyberskills submitted 11 recommendations to the DHS secretary on how to improve the agency's cyber workforce. The committee said DHS must define the skills needed to protect .gov networks. It also suggested setting testing and certification standards.

    October 05, 2012
  • Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.

    October 05, 2012
  • The annual reporting memo gives agencies 57 questions and answers as they prepare their 2012 cybersecurity report.

    October 04, 2012
  • Cybersecurity affects every agency, program and employee, and has become an even greater challenge to manage as global networks become more susceptible to risk. Learn how agency CIO's can develop cyber strategies and support the desired goals to recruit, retain, and develop the cyber workforce amidst the growing talent gap. General Harry Raduege, Chairman, The Deloitte Center for Cyber Innovation, Deloitte Services LP and Michael Gelles, Director, Deloitte Consulting LLP weigh in on this timely discussion for cybersecurity month.

    October 03, 2012
  • Casey Coleman, CIO at the GSA, gives a preview of the 2012 Executive Leadership Conference. Lynn Bernabei, a partner with Bernabei and Watchel, discusses the House's sweeping update to the law protecting federal whistleblowers. Tom Fox of the Partnership for Public Service tells how managers can keep their workforce motivated in tough times. Miriam Nisbet of the National Archives discusses a new website aimed at speeding up the FOIA request process.

    October 02, 2012
  • The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.

    September 28, 2012
  • Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.

    September 27, 2012
  • The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.

    September 27, 2012
  • Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton. September 25, 2012

    September 25, 2012
  • Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?

    September 25, 2012
  • The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.

    September 24, 2012
  • The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.

    September 24, 2012
  • OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.

    September 21, 2012