The Great Cyber Convergence in 2015: AFCEA Speaks

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share:

Originally posted on BreakingDefense by 

Technology is moving too fast to keep track of everything, but there's one overarching trend that policymakers must not miss in 2015. Call it "convergence."

Cybersecurity is no longer its own specialized function for tech geeks to take care of off to one side while the rest of the organization gets on with the real mission. To the contrary, cybersecurity is becoming an increasingly central concern for more and more institutions, from Sony Pictures to the US Army, from Marine Corps drone units to Pentagon cloud computing contractors. Integrating the new technology into operations will require new concepts, sustained funding, and open communications between government and industry -- none of which is guaranteed in 2015. Continue reading

DHS Sketches the Tech Future

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share:

Originally posted on FCW

Reginald Brothers will probably be out of his job in another two years or so. But he's making policy plans for the next three decades.

This week, Brothers -- Homeland Security undersecretary for science and technology -- laid out an ambitious, though very general, long-term agenda for DHS's tech-development arm that concentrates on developing a seamless cybersecurity infrastructure, networked threat detection technology, and speedier traveler and cargo security detection capabilities.

Brothers unveiled the goals for the Science and Technology Directorate after consultation with a number of stakeholders. Continue reading

We Want You: To Provide Cybersecurity Training

 

We are continuing our focus on cybersecurity as we roll through October, the official month for cybersecurity awareness. Here at GovEvents we feel there is a strong connection between awareness and training. There has been wide reporting about the shortage of trained cyber professionals. So how do we get qualified (and interested) professionals up to speed on the practice of cybersecurity?

As we mentioned in a post this summer, cybersecurity is among the most common topics for events listed on GovEvents.com. There are a wide variety of events from panel discussions sharing lessons learned to specific technology demos and trainings. Given the need for more professionals, in-depth hands on training may be the most needed type of event. Continue reading

User Error: Training Your Organization Around Basic Security Threats

With October recognized as cybersecurity awareness month, we have been giving some thoughts to the areas of cybersecurity where events and training can make a big difference. One area that jumped to mind was general cybersecurity awareness training for all members of your organization.

In talking about "insider threat" most people think of the recent Snowden/NSA case where a credentialed and background cleared employee knowingly leaked data  he rightfully had access to. But insider threat is more than that. It is also accidental data leaks, breeches, and security violations. You may have great virus protection, firewall technology, even continuous monitoring devices, but one errant click by an employee can bring your IT system to its knees. Continue reading

House Intelligence Committee Chairman: We Need More Cyber Offense

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share:

Originally posted on FCW.com

House Intelligence Committee Chairman Mike Rogers said Oct. 1 he would like to see the United States go on the offensive in cyberspace more than it does, but that there is not a clear understanding across government of what an offensive policy entails.

The Michigan Republican said the Pentagon, the intelligence community and law-enforcement agencies must agree on attack protocols in the event Washington goes on the offensive in cyberspace.

"We haven't coordinated that policy," he told reporters after his appearance at a Washington Post-hosted conference. "We have disparate levels of cyber offensive capability across the federal government. ... Some are fantastic, some not so good and then [there are] some in the middle."

Continue reading