To judge the progress of cybersecurity preparedness in the federal government, you’ve got to take a long-term view. One person who’s been tracking cybersecurity and cyber education for more than 20 years, Alan Paller, director of research at the SANS Institute joined the Federal Drive with Tom Temin.
Richard Spires, CEO of Learning Tree International, joins host John Gilroy to discuss how to use continuous learning to close the “skill gap” in the federal government. May 10, 2016
The Homeland Security Department launched a new type of red team effort where they break into an agencies’ networks over the next 90 days and help them make long-term, sustainable fixes.
COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.
The Office of Management and Budget just posted the latest data from its 30-day cyber sprint. Alan Paller of the SANS Institute and a task force of industry experts offer their insight on what are the next steps agencies should be taking to improve their cybersecurity.
For agency managers responsible for cybersecurity, the last few weeks have been challenging. The data breach affecting millions might have been the direct responsibility of the Office of Personnel Management, but the response has been all-of-government – starting with the now-concluded 30-day cyber sprint. Cyber is a matter of technology, skill and people. Alan Paller, the director of research at the SANS Institute, joined Jared Serbu on the Federal Drive to offer some perspective on what CIOs and cybersecurity officers need to do next.
Alan Paller and John Pescatore of the SANS Institute explain why Katherine Archuleta’s departure may not be a fair nor effective means for addressing the cybersecurity problems at OPM.
In the aftermath of the massive data breach suffered by the Office of Personnel Management, the Homeland Security Department issues a new alert about targeted phishing attacks against federal employees and retirees. Federal News Radio asked cyber experts for advice on what victims should be on the lookout for from these bogus emails.
The Office of Personnel Management starts notifying employees today that their personal information may have been compromised. As many as 4 million current and former federal employees may be affected. Now the question is, has the government learned anything from this incident, or is it lurching from crisis to crisis? SANS Institute’s Director of Research Alan Paller joined Tom Temin on the Federal Drive for a look ahead.
A large chunk of the government IT workforce that’s charged with implementing the Homeland Security Department’s new continuous diagnostics and mitigation initiative still doesn’t know much about it. The lack of awareness is most acute with agency inspectors general. But those that have pressed forward with CDM say their networks have already become more secure or less costly.