Homeland Security 2014



Photos from the Homeland Security Conference 2014

Event eNews: Homeland Security 2014

Homeland Security 2014: 4th Generation DHS: Remaining Ever-Vigilant

Online Show Daily

Day 1: Improving Information Sharing and Interoperability
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.

Day 2: Cybersecurity Tentacles Entwine Government
It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

Day 3: Word of the Day: Partnership
Officials from across the Homeland Security Department (DHS) stressed the need for strong partnerships during the third and final day of the AFCEA Homeland Security Conference, Washington, D.C.

The Latest Coverage From Homeland Security 2014

Disneyland for Law Enforcement

The Federal Law Enforcement Training Center (FLETC) is becoming known as the “Disneyland for law enforcement” because of the facility’s extensive use of sophisticated simulation technologies, according to Sandy Peavy, FLETC chief information officer.

Eagle II May Move Forward Soon

The troubles may soon end for the Department of Homeland Security’s (DHS’s) seven-year, $22 billion Enterprise Acquisition Gateway for Leading Edge Solutions II (EAGLE II) contract, and the program will ultimately be successful, indicated Nick Nayak, DHS chief procurement officer.

Chief Information Security Officers Support Continous Diagnostics and Mi...

Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.

Cybersecurity Emerging from the World of Wizardry

The realm of cybersecurity is continually evolving and will continue to do so, indicates Tony Sager, director of programs, Council on CyberSecurity. While participating on the Professionalization of Cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., Sager discussed the evolution he has seen during his career in information technology.

More coverage ...


Related SIGNAL Articles

Ramping Up the Cyber Criminal Hunt

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

Automated Diagnostics and Mitigation Protects Civilian Government Comput...

A Department of Homeland Security program is automating the cyber attack detection process to manage the bulk of intrusion detection and mitigation work in real time across the entire civilian government. This effort addresses a long-time shortcoming for detecting attacks and intrusions into government computer networks. Traditionally, this activity has been a time-consuming and manpower-intensive process that would take place days or weeks after the incident.

National Security Advances in an Increasingly Connected World

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

Coast Guard Develops Indigenous Technologies for Cutters

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

Seeking Smoother Interoperability Waters

When the U.S. Coast Guard fields its newest cutter next year, the ship will be equipped with an information technology package that offers common tools and capabilities among the cutter and aviation fleets. The technology suite will improve interoperability across the service and with other agencies, and it enhances situational awareness while providing flexibility for future upgrades.

Public News Coverage


AFCEA Directories

Homeland Security Directory
Cybersecurity Directory

Related Courses From the PDC

Homeland Security: The National Challenge: Part 1
Homeland Security: The National Challenge: Part 2

This course, started by Jim Flyzik, former Senior Technology Advisor in the White House Office of Homeland Security, explores the complexities of Homeland Security and provides an arsenal of information which will arm you to do business with the Department of Homeland Security (DHS). Students will receive access to the Homeland Security Digital Library hosted by the Naval Postgraduate School. By participating in this course students will have the opportunity to meet guest speakers who represent various portions of DHS and other U.S. Government organizations which have homeland security or homeland defense responsibilities. These experts will provide insight into DHS and decipher roles and responsibilities of the various organizations and agencies that interact with DHS.









Larger Map | Venue Website