Homeland Security 2014

Photos from the Homeland Security Conference 2014

Event eNews: Homeland Security 2014

Homeland Security 2014: 4th Generation DHS: Remaining Ever-Vigilant

Online Show Daily

Day 1: Improving Information Sharing and Interoperability
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.

Day 2: Cybersecurity Tentacles Entwine Government
It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

Day 3: Word of the Day: Partnership
Officials from across the Homeland Security Department (DHS) stressed the need for strong partnerships during the third and final day of the AFCEA Homeland Security Conference, Washington, D.C.

The Latest Coverage From Homeland Security 2014

Disneyland for Law Enforcement

The Federal Law Enforcement Training Center (FLETC) is becoming known as the “Disneyland for law enforcement” because of the facility’s extensive use of sophisticated simulation technologies, according to Sandy Peavy, FLETC chief information officer.

Eagle II May Move Forward Soon

The troubles may soon end for the Department of Homeland Security’s (DHS’s) seven-year, $22 billion Enterprise Acquisition Gateway for Leading Edge Solutions II (EAGLE II) contract, and the program will ultimately be successful, indicated Nick Nayak, DHS chief procurement officer.

Chief Information Security Officers Support Continous Diagnostics and Mi...

Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.

Cybersecurity Emerging from the World of Wizardry

The realm of cybersecurity is continually evolving and will continue to do so, indicates Tony Sager, director of programs, Council on CyberSecurity. While participating on the Professionalization of Cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., Sager discussed the evolution he has seen during his career in information technology.

More coverage ...

Related SIGNAL Articles

Ramping Up the Cyber Criminal Hunt

Automated Diagnostics and Mitigation Protects Civilian Government Comput...

National Security Advances in an Increasingly Connected World

Coast Guard Develops Indigenous Technologies for Cutters

Seeking Smoother Interoperability Waters

Public News Coverage

AFCEA Directories

Homeland Security Directory
Cybersecurity Directory

Related Courses From the PDC

Homeland Security: The National Challenge: Part 1
Homeland Security: The National Challenge: Part 2

This course, started by Jim Flyzik, former Senior Technology Advisor in the White House Office of Homeland Security, explores the complexities of Homeland Security and provides an arsenal of information which will arm you to do business with the Department of Homeland Security (DHS). Students will receive access to the Homeland Security Digital Library hosted by the Naval Postgraduate School. By participating in this course students will have the opportunity to meet guest speakers who represent various portions of DHS and other U.S. Government organizations which have homeland security or homeland defense responsibilities. These experts will provide insight into DHS and decipher roles and responsibilities of the various organizations and agencies that interact with DHS.

Larger Map | Venue Website