Day: April 1, 2015

March 2015 GovLoop Guide Interview with our CTO, Prem Jadhwani, on “Crafting Holistic Insider Threat Protection”

Many news outlets declared 2014 to be “The Year of the Breach,” especially for government. The title seems appropriate. Last year, the U.S. Postal Service (USPS), the Nuclear Regulatory Commission, the State Department, and even the White House fell victim to successful hacks that resulted in sensitive information being exposed to adversaries and the public.

And that’s just the beginning. Nearly every state experienced a government network breach during 2014, while simultaneously managing disruptions in commerce caused by hacks of companies such as Home Depot, Staples, and Target. Even localities were not exempt — Rapid City, N.D., and Napa, Calif., are just two cities whose websites were hacked.

Nevertheless, maybe we should reconsider that title and be a little more optimistic. Instead of “Year of the Breach,” can we consider 2014 to be the “Year of Lessons”? Maybe the “Year of Progress”? While government-at-large certainly faced setbacks in the cyber world, many agencies also took great steps toward security. At the federal level, commitments were made and plans drawn to better equip smaller entities with the resources and strategies necessary to protect their networks. Locally, many organizations created new partnerships and streamlined their internal systems to achieve greater security at less cost.

This guide explores how local, state, and federal governments have learned from successful attacks of the past to bolster their cybersecurity today. In this guide, we:

  • Describe the level and impact of advanced cyberattacks on government agencies.
  • Discuss five cybersecurity tactics that the public sector has deployed to mitigate risk.
  • Provide two case studies from government to illustrate each tactic in action.
  • Detail lessons learned from these government tactics.

The numerous cyber incidents of last year prove there is still more government must do to secure our nation’s networks. However, the case studies in this guide highlight that innovators in the public sector are already leading the way to enhanced cybersecurity.

Download the guide here.

News

2015 Symantec Government Symposium

Come see Government Acquisitions’ Chief Technology Officer, Prem Jadhwani, be a part of a panel discussion on “Risky Business: Minimizing Insider Threat” at the 2015 Symantec Government Symposium.

When: April 15, 2015 at 10:00AM.

Where: Walter E. Washington Convention Center

Washington, D.C.

About the Event

We are pleased to announce that the 2015 Symantec Government Symposium, “Secure Government: Manage, Mitigate, Mobilize,” will take place on April 15, 2015 at the Walter E. Washington Convention Center in Washington, D.C.

Serious challenges call for serious dialogue. Join the leading government IT security and management professionals, keynote speaker Robert Mueller (former director of the FBI), and Government Acquisitions at this one-day event to discuss best practices in:

  • The New IT: Learn how to ensure secure information access and hear real-world case studies in secure application management
  • Data Optimization: Learn about data governance and information sharing in the age of big data
  • Legislation and Policy: Get the read on cyber legislative priorities and policy driving implementations
  • Cyber Front Lines: Discuss security intelligence, cyber crime scenarios, and advanced persistent threats
  • Securing Government: Focus on insider threats, CDM, and risk management

Click here to register.

Events, News

SOFIC 2015

Come see Government Acquisitions at the upcoming SOFIC 2015  

(Special Operations Forces Industry Conference) on May 19 – 21, 2015!

Booth # 2128

“Winning in a Complex World”  

2015 SOFIC (Special Operations Forces Industry Conference) will be held May 19–21, 2015 at the Tampa Convention Center, Tampa, FL. This year’s conference theme, “Winning in a Complex World,” will provide a forum for military, government, academia, and industry stakeholders to network and discuss current and future challenges and how to best support our Special Operations Forces (SOF) around the globe.

Additional information can be found on the SOFIC website

Events

2015 Department of Energy Cybersecurity Training Conference

Come see Government Acquisitions at the upcoming 2015 Department of Energy

Cybersecurity Training Conference on April 21 – 22, 2015!

Enabling Agents of Change: Securing DOE through Collaboration

Celebrating 32 years of cyber collaboration in exploring and implementing new cyber technologies required to securely accomplish the DOE mission.

The Department of Energy Chief Information Officer (CIO) and the Associate CIO for Cybersecurity welcome you to participate in their 2015 Department of Energy 32nd Cybersecurity Training Conference.

As an important part of the outreach of the Office of Cybersecurity to the Department’s field and program elements, the conference provides opportunities for information exchange among Federal and contractor staff and covers technical and management issues, policy, and awareness related to the protection of the Department’s computers, networks, data, and implementation of information technology. The conference includes well-known speakers in the cybersecurity field and multi-tracked technical and management briefings on current research and practices that are useful to the attendees. The agenda structure also allows for working group meetings and workshops. Conference plenary and track sessions provide networking and in-depth opportunities in cybersecurity technical disciplines as well as implementation of Federal and Departmental policy and guidance. While technology is a key element of the conference, the focus is on collaboration in providing meaningful information as Enabling Agents of Change in Securing DOE through Collaboration to maximize value of IT for the agency.

April 21-22, 2015
Sheraton Kansas City Hotel at Crown Center
Kansas City, MO

Additional information can be found on the event website

Events
en_USEnglish