Cybersecurity

  • Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?

    September 25, 2012
  • The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.

    September 24, 2012
  • The study says Eastern European hackers have a more sophisticated infrastructure and use more sophisticated malware than Eastern Asian hackers.

    September 24, 2012
  • OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.

    September 21, 2012
  • Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements. September 20, 2012

    September 20, 2012
  • The Federal IT Acquisition Reform Act would codify much of the Obama administration's 25-point IT reform plan. The draft bill would go even further in attempting to address long-standing challenges for agency chief information officers.

    September 20, 2012
  • Cyber criminals might unknowingly provide the impetus to help agencies address a cybersecurity skills gap. OPM also is working with agencies to address other shortfalls in key workforce competencies.

    September 20, 2012
  • Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.

    September 20, 2012
  • RSA and Booz Allen Hamilton said they will jointly develop new information security products and offer them as managed services.

    September 20, 2012
  • The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.

    September 19, 2012
  • Military's cyber leaders say job satisfaction has so far trumped salary concerns when it comes to building and retaining a workforce of elite cyber warriors. Building the capacity of that training pipeline is the next challenge.

    September 19, 2012
  • The goal was to achieve an efficient, effective and accountable government. A key strategy was to change the way the federal employee approached the job. In part three of Federal News Radio's week-long, multimedia special report, The Obama Impact: Evaluating the Last Four Years, we examine the tactics employed to create a more efficient workforce; hiring and SES reform, reducing backlogs in security clearances and retirement claims, building a cyber workforce, telework and the overall support of the civil servant. Four were rated as effective, two as more progress needed, and one as ineffective.

    September 19, 2012
  • The contract is part of DARPA's High-Assurance Cyber Military Systems.

    September 18, 2012
  • The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.

    September 18, 2012

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.