September 22nd at 11 AM Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure. This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.
This week, host Jason Miller talks with Simon Szykman, the new CIO at the Department of Commerce. September 16, 2010
Your agency is consolidating data centers, but you might run into a few problems along the way. The Commerce Department has closed six. Simon Szykman, CIO for Commerce, explains how to make this consolidation process as smooth as possible.
Commerce CIO Simon Szykman explains how the role of the bureau CIO is different from a department CIO.
Federal News Radio looks at how rapid advances in mobile devices and applications are redefining what it means to be a federal manager on the go, with panelists Simon Szykman at Commerce and the FAA’s Robert Corcoran.
Remember the idea of a stipend to help pay for the technology you REALLY want?
The Shared Services Strategy is the latest way agencies can reduce spending on infrastructure technology and spend more on mission-critical IT. Federal CIO Steven VanRoekel said PortfolioStat is the lynchpin to the entire process for agencies. He held the first meeting with agencies leaders to discuss expectations.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Scott Quehl, the CFO, and Simon Szykman, the CIO, work closely together on ensuring projects remain on track and are efficient as possible. Their relationship is making it easier for Commerce to deal with budget and oversight pressures.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.