Managing the myriad programs designed to provide border security has proved challenging. The Department of Homeland Security (DHS) has launched a variety of technology efforts designed to enhance border security. Likewise, civilian firms are deeply involved with DHS in supporting these programs. Two panels running Wednesday examined the government and industry perspectives of coordinating border security.
Congresswoman Loretta Sanchez spoke bluntly to the issues of the DHS mission, border security and cybersecurity, pointing out that these topics are still quite the mystery not only to the general public but to Congress as well.
"Stop pontificating about the rules and be an example." --Marc Sachs Verizon says to goverment agencies about cybersecurity practices
Technology has had a significant impact in streamlining the work of Washington D.C.'s Metropolitan Police Department (MPD). This was the message conveyed by D.C. MPD Police Chief Cathy L. Lanier yesterday during a lunchtime address to the attendees at AFCEA's Homeland Security Conference.
The popularity and growth of social media networks and blogs offers federal agencies with new tools to get their message to the nation's citizens. However, the openness of social media platforms also presents a security challenge. A panel of government and commercial media experts pondered the implications of widespread adoption of social media platforms at AFCEA's Homeland Security Conference.
AFCEA's ninth annual Homeland Security Conference kicked off yesterday morning with a panel session focused on cybersecurity issues. The panelists highlighted a variety of ongoing federal initiatives to defend the nation's critical infrastructure from cyberattacks and discussed some of the new threats developing in cyberspace.
No, I'm not talking about the classic Marilyn Monroe film; I'm talking about AFCEA's Homeland Security Conference, going on this Wednesday and Thursday. The theme is "DHS: The 7-Year Itch-Renewing the Commitment." The event will cover such topics as cybersecurity, securing social media, transparency, identity management, information and intelligence sharing, and more.