Recent cyber attacks have left the Energy Department with a $2 million bill.
The center has also established internships at the National Security Agency and the National Defense University.The goal is to build awareness among officers of what strategists consider the fifth domain of warfare.
Bruce Levinson, with the Center for Regulatory Effectiveness, joined the with Tom Temin and Amy Morris to discuss the center\'s recent survey on agency FISMA compliance.
OPM developing competency models for performance improvement officers and chief operating officers as part of its requirements under the GPRA Modernization Act. DHS moves to agile development to fix the HSIN program. NIST to update HSPD-12 card requirements to meet mobile needs.
Military services and agencies, alike, are under pressure from senior defense officials to find savings from IT Rob Carey, DoD's deputy CIO said at the annual Executive Leadership Conference. In the coming weeks, Defense CIO Teri Takai will issue a memo detailing a new strategy for bringing existing consolidation and standardization efforts together. The budget pressures have helped push the department out in front of emerging cyber and mobile technologies.
The agency has launched its Small Biz Cyber Planner to help businesses make a cybersecurity protection plan
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.
The virus is called \"duqu\" because it creates files with the letters \"DQ\" in the prefix.Cybersecurity experts say the malicious code can collect data, then lie in wait for future attacks.
The Homeland Security Department announced Mark Weatherford has been appointed deputy under secretary for cybersecurity for the National Protection and Programs Directorate.
James Lewis of the Center for Strategic and International Studies says the strategies of the chambers differ but the policies are actually similar.
Davin Knolton, the assistant chief of staff at the Army Combined Arms Center at Fort Leavenworth, Kan., who created a system that searches for, finds and remediates classified information on unclassified systems, joined the Federal Drive with Tom Temin and Amy Morris to discuss his idea.
CIOs and other federal IT experts say cloud computing security isn\'t much different than other protecting other technology systems. The chief technology officer for the CIA, Gus Hunt, said the cloud\'s elasticity makes it harder for hackers to attack.
A major goal of this new task force is to break up the comprehensive cyber bill into four separate components each of which could be addressed by an individual bill.
The training would show how to handle personal information, government records and show restrictions on how the data is stored.
The partnership will establish L-3\'s Cybersecurity Solutions Center, and both L-3 and Virginia Tech will offer customized cyber solutions to secure critical networks against exploitation and attack.