Cyber denizens meet on DEFStar-an innovative social media site geared toward government and military.
President Obama has named Howard A. Schmidt the new White House Cybersecurity Coordinator.
The DHS has instituted a new job application process for cybersecurity positions. The good news? It's free of KSAs. Right now the agency is hosting a virtual job fair for those interested. Applicants no longer have to worry about KSAs or a points system; they simply submit cover letters and résumés, which are reviewed by hiring managers. DHS officials will then contact candidates of interest to invite them to a private interview event.
February may seem far away, but it will be here in no time at all. Make plans now to attend two great events: the West 2010 Conference in San Diego and the Homeland Security Conference in Washington, D.C.
Two leaders in the intelligence realm shared their main concerns about security and cyberspace to a packed auditorium at the SOLUTIONS Series.
Tracks panelists at SOLUTIONS discuss the foundational issues, current initiatives and long-term plans for cybersecurity.
Sherri Ramsay, director of the NSA's Central Security Service Threat Operations Center, says that the intersection of cyber, national and economic security has changed the way her organization interacts with industry.
The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.
Government needs to "think flat' and create a cybersecurity architecture that emphasizes a peering structure rather than a vertical architecture.
Joe Mazzafro, writing over at the MAZZ-INT blog for the AFCEA Intelligence community, explores the difficulty in finding a person who is both qualified and willing to be the new "Cyber Czar." "Given these circumstances I just don't see many high profile personalities attracted to being the third or fourth choice for a position that lacks authority, reports to a Deputy National Security Adviser and must operate in the shadow of DIRNSA," he writes.
Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought.