Technology

  • Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity. This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.

    February 19, 2014
  • Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency. February 18, 2014

    February 18, 2014
  • The Pentagon leverages the buying power of 2.6 million DoD personnel in the Air Force, Army and Defense Information Systems Agency in signing joint enterprise license agreement with CDW-G.

    February 18, 2014
  • DHS ICE issued a solicitation looking for a vendor to provide technology to let law enforcement officers hook into the National License Plate Recognition Database.

    February 17, 2014
  • In this week's edition of Inside the Reporter's Notebook: USAID and the Medicaid and CHIP Payment and Access Commission (MACPAC) search for new CIOs; DoD asks for vendor input on what statutes negatively impact procurement regulations; and efforts to make federal grants more transparent and accountable receive strong support from good government groups.

    February 16, 2014
  • U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.

    February 14, 2014
  • Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.

    February 14, 2014
  • The White House will release an updated list of agency high-priority goals and cross-agency priority goals with the annual budget request to Congress in March. Meanwhile, the Office of Management and Budget detailed agency successes over the last two years in meeting current goals.

    February 14, 2014
  • The Army's Rapid Equipping Force is unpacking the results of a new demonstration designed to crowdsource soldiers' top-priority battlefield needs.

    February 14, 2014
  • Brig. Gen. Kevin Nally, the Marines Corps CIO, said the service is updating its network hardware and collapsing five unclassified networks into one. February 13, 2014

    February 13, 2014
  • On this week's Capital Impact show, executives from Liberty Group Ventures discuss the roll out of the administration's new cyber framework and how it will affect the private sector. February 13, 2014.

    February 13, 2014
  • The Senate confirmed Sloan Gibson to be the next deputy secretary of the Department of Veterans Affairs. The director of the National Institute of Standards and Technology, Patrick Gallagher, is heading off to academia.

    February 13, 2014
  • Government officials, associations and companies are offering insight and comments on the recently released White House cyber framework.

    February 13, 2014
  • NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.

    February 12, 2014

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.