SORT BY Relevancy
As evidenced by the recent data breach that impacted OPM and - as a result - over 14 million government employees, cybersecurity remains one of the single biggest challenges impacting government agencies and their IT departments today.
When most people think of technology investments for improving cybersecurity and protecting government networks, they think about firewalls, intrusion detection, and network access control. Very rarely do they think of video teleconferencing.
In this episode of the Public Sector View Radio, Polycom's Tia Crawford joins the program live from the show floor of the AFCEA Defensive Cyber Operations Symposium to discuss the current threat landscape impacting government agencies and the role that VTC plays in cybersecurity.
The Cybersecurity Information Sharing Act of 2015 or CISA is expected to pass in the house tomorrow, October 27, 2015. The legislation claims to help with cybersecurity, but critics say otherwise.
The bill is a reincarnation of SOPA and CISPA, which were previous failed attempts to pass similar legislation.
CISA puts the department of homeland security in charge of massive data collection powers and provides legal immunity to corporations who share user data with the government. The law also allows DHS to share any data it captures through private sector sharing with any federal agency and even contractors.
Watch on YouTube: https://youtu.be/uFCrxvJxav8
Read more here: http://www.infoworld.com/article/2995960/government/cisa-congress-law.html
Show your disapproval to congress with Popvox (it’s free & easy): https://popvox.com/bills/us/114/s754
Is the cybersecurity skill shortage actually a generation gap? It would seem so from the results of a recent global survey of 4000 young adults by Raytheon and the National Cyber Security Alliance (NCSA). Among the findings: Only half of the men in the survey said they knew what a cybersecurity job entails; for millennial women, awareness was even lower – just one-third of respondents.
Join us for the next episode of Dark Reading Radio where Dark Reading Executive Editor Kelly Jackson Higgins will lead an in-depth discussion about what it will take for 18 to 34-year-olds to warm up to an exciting and rewarding career in information security – and what is holding them back. Our guests will include authors of the Raytheon/NCSA report, along with millennials Kerstyn Clover, a staff consultant on the SecureState Attack and Defense Team and Ryan Sepe, information security analyst at Radian Group Inc.
Register now and join us Wednesday, November 18, 2015, New York/10:00 a.m. San Francisco 1:00 p.m.
Southern Sense is a show of conservative talk on news and events, with Annie "The Radio Chick" Ubelis as host and Curtis "CS" Bennett, co-host. Informative, fun, irreverent and politically incorrect, you never know where we'll go, but you'll love the journey!
Visit our website at http://www.Southern-Sense.com, become a member and follow us here and on Facebook.
Dedication: Kansas City Firefighters John Mesh and Larry Leggio, killed in a fire on October 13, 2015
Michael Daugherty, knows all about government agency power grabs, he is a Board Member at Snoopwall the powerhouse cyber-security firm and is author of The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach Into Cyber-security, Medicine and Small Business.
Five years ago, the US government teamed with a private enterprise to attack and take a file without authorization from an American small business. They used that information in order to expand and grow a government agency.
The book in engaging detail describes his experience of the last six years as he personally witnessed a government power grab and intimidation that, if not for the fact that it is all real, would make for an a brilliant novel.
Data security is a hot C-suite and board level topic as more and more companies make unflattering news when they’ve been hacked and valuable information gets stolen and misused.
What two factors are essential for keeping your data safe? How safe is the Cloud? How do you create unique passwords you can actually remember? What’s the first thing you should do if you believe your computer has been hacked?
Discover the answers by joining host Hanna Hasl-Kelchner as she welcomes Randy Gilmore, Security Consultant from Protus3, a security consulting, investigations, and design firm with a commitment to provide comprehensive programs and controls so clients will have the assets and stability to prosper.
Rusty has been involved in countless computer forensic cases . . . think of it as CSI Cyber but happening to a business near you.
Since it’s always smarter and cheaper to learn from other people’s mistakes it pays to tune on for his powerful tips and strategies to help keep your valuable data safe.
This program is proudly sponsored by the Legal Leverage® Academy, a div. of Business M.O., LLC.
Bob Dix, the Vice President of Global Government Affairs & Public Policy with Juniper Networks, joins the program to discuss President Obama's executive order for private and public companies to share cybersecurity and security breach information to better solidify the nation's security posture.
Topic: National Cyber Security Awareness Month – Staying Safe Online – A Shared Responsibility
The theme for NCSAM is focused on “Our shared responsibility” – what does that mean for federal agencies and industry?
Recently Dell released a mobile safety checklist. Tell us about the tips you suggest for agencies to follow to keep employees safe online, while also protecting the agency’s data.
Despite ongoing discussions about cybersecurity, we still see several high profile hacks this year with the latest including OPM and Ashley Madison. What lessons can we learn from these instances?
Are there any agencies that you know of who do an excellent job in terms of teaching or modeling stellar cyber security protection?
The NYSE halted trading and United Airlines grounded thousands of flights, both due to computer problems, so is it time to invest in cybersecurity stocks? China’s market is tanking, but should U.S. investors buy the dip? Plus, sportswriter Barry Svrluga analyzes baseball’s $9 billion industry and discusses his new book, “The Grind: Inside Baseball’s Endless Season”.
In the wake of NYSE’s technical glitches (as well as United Airlines and WSJ.com), analyst Simon Erickson shares what he learned on his recent trip to Silicon Valley to visit FireEye, a cybersecurity company. We discuss the latest with cloud computing, “fog” computing (yes, it’s a thing) and driverless cars. Plus we finally break the news about The Motley Fool’s newest podcast, “Rule Breaker Investing” hosted by co-founder David Gardner!
On episode 343 of Business Insanity Talk Radio, we first talk to the woman behind the voice giving you directions on your smart phone. Who is she and how did she get her voice into GPS systems? I'll introduce you to Karen Jacobsen. Next, we are going to show you the one thing you have to do if you want to protect your small business from internet dangers. Anthony L. Butler has the answer. Do you have an idea for a board game and wish you could bring it to market? We’ll talk about how my next guest, Tim Swindle, did just that. How often should you follow up with a prospect after they have said no? John McGee reveals the secret formula. Finally, with the help of John Sparks, we are going to show you how to make money on Twitter.
Sponsored by Sage and Nextiva.
Welcome to the TechSource podcast series. Today, we are speaking with Jon Kim, Director, Cyber Practice at Iron Bow, about government cybersecurity trends for 2014.