Cybersecurity

  • Debra Roth hosts a roundtable discussion of the "hot" federal workforce topics in 2014, and what will be the big issues in 2015. December 19, 2014

    December 19, 2014
  • If recent events on the cybersecurity front have scared the heck out of you, well, good. There's a lot you can do. How about start by reading the latest version of the government's premier publications on how to assess whether your security and privacy controls are adequate for today's hacker-plagued world? Dr. Ron Ross, FISMA Implementation Project and Joint Task Force Leader at the National Institute of Standards and Technology, joined Tom Temin on the Federal Drive to discuss what's in the newest revision of Special Publication 800-53-A.

    December 19, 2014
  • A new cybersecurity unit at the Justice Department will offer itself as a legal advisor for cyber crime investigations worldwide. It will be operating under the department's Computer Crime and Intellectual Property Section. And its doors are already open. Michael Stawasz, the deputy chief for computer crime in the Justice Department's Criminal Division, joined Tom Temin on the Federal Drive to explain why this unit was needed, as well as what sets it apart from DOJ's existing cyber crime departments.

    December 19, 2014
  • The Homeland Security Department released the executive summary of suggestions of an expert panel for how to reform the Secret Service. Secretary Jeh Johnson said the Secret Service is in need of some change. He also offers an update on his Unity of Effort initiative.

    December 19, 2014
  • The Office of Personnel Management is going to notify 48,439 federal employees whose personal information may have been exposed due to a compromised computer network at KeyPoint Government Solutions.

    December 18, 2014
  • Steph Warren, the Veterans Affairs Department chief information officer, said the agency is the first to implement advanced cyber capabilities from DHS known as Einstein 3A, and is expanding its continuous monitoring capabilities.

    December 18, 2014
  • A new memo from acting CIO Terry Halvorsen removes the requirement for DISA to be the main path to buy cloud computing services.

    December 18, 2014
  • Dave Bennett, DISA's chief information officer, said the agency is beginning to implement a new approach to cybersecurity. He said the continuous monitoring risk scoring system (CMRS) looks at a variety of factors to give the agency a score based on a set of predetermined analytics.

    December 18, 2014
  • Agencies are struggling in how they describe the requirement for cloud services to meet the Federal Risk Authorization and Management Program cyber standards. The FedRAMP program management office details programmatic goals for 2015, including new metrics to determine governmentwide uptake of the standards.

    December 17, 2014
  • For cybersecurity, research and development and defense contracting, the Washington D.C. region carries a lot of weight. Now that Congress has passed a 2015 federal budget, lots of companies are looking to see how cyber, R&D and defense programs are likely to fare in the coming year. Jonathan Aberman has been looking into this. He's the managing director of Amplifier Ventures in Northern Virginia and the founder of the non-profit Tandem NSI, which brings new companies to the federal market. He joined Tom Temin on the Federal Drive for some analysis.

    December 16, 2014
  • The granddaddy of cybersecurity legislation has a new heart and soul. The Federal Information Security Modernization Act is on the way to President Obama for his signature. FISMA was one of five cyber bills Congress passed over the last week. In his bi-weekly feature, Inside the Reporter's Notebook, Federal News Radio Executive Editor Jason Miller tells In Depth with Francis Rose about a few of the most important changes agencies should expect from the bounty of cyber laws.

    December 15, 2014
  • The passage of five cybersecurity bills by Congress in the past week signals a long-coming and much needed change to how agencies defend their computer networks and hire the people to do that critical work.

    December 15, 2014
  • The Defense Department has been slowly rolling out the Intelligence Community Information Technology Environment departmentwide. The Navy's Deputy CIO Janice Haith told an industry audience Friday that the Navy is already embracing ICITE's capabilities.

    December 12, 2014
  • Whether or not North Korea was behind the recent cyber attack on Sony Pictures, its level of sophistication suggests it was sponsored by a country, not a group of hackers. And the FBI believes the same attack could just as easily have penetrated most sophisticated networks, including government ones.

    December 11, 2014