Weekly Roundup for July 29, 2016

Featured

The IBM Center's Weekly Roundup highlights articles and insights that we found interesting for the week ending July 29, 2016.

On the Radio Hour

Ronald Layton
Deputy Chief Information Officer
U.S. Secret Service

In the magazine

Insights from Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security
Enhancing Cybersecurity in a World of Real- Time Threats: Insights from Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity and Communications,...

On the blog

National Cybersecurity Center of Excellence (NCCoE) – Accelerating the Deployment and Use of Security Technologies
Monday, August 22, 2016 - 14:46
The NCCoE's vision is to offer a secure cybersecurity infrastructure that inspires technological innovation and...
View All content in Strengthening Security ( 1-10 of 146)
Sort by:
The NCCoE's vision is to offer a secure cybersecurity infrastructure that inspires technological innovation and fosters economic growth through advanced cybersecurity.
0 comments
0 recommendations
The IBM Center's Weekly Roundup highlights articles and insights that we found interesting for the week ending July 29, 2016.
0 comments
0 recommendations
What is the mission of the National Cybersecurity Center of Excellence (NCCoE)? What are its strategic priorities? How does it accelerate the deployment and use of secure, standards-based technologies? What are some of the key cyber challenges facing us today? Join host Michael Keegan as he explores these questions and more with Nate Lesser, Deputy Director, National Cybersecurity Center of Excellence.
0 comments
0 recommendations
What has the FCC done to transform its IT infrastructure? How has the FCC Chief Information Officer cultivated a network of change agents? What is the FCC doing to cultivate a culture of risk-taking and experimentation? Dr. Bray, FCC Chief Information Officer, joined me on The Business of Government Hour to share his insights on these topics and more.
0 comments
0 recommendations
This edition of the Business of Government magazine highlights strong leaders with the right talent who are charged with executing the business of government. These leaders are responsible for a vast array of government missions that comprise a significant chunk of the federal government budget.
0 comments
0 recommendations
IT security needs to be proactive—using cyber analytics and cognitive-based systems to ultimately achieve security intelligence.
0 comments
0 recommendations
The IBM Center's Weekly Roundup highlights articles and insights that we found interesting for the week ending July 15, 2016.
0 comments
0 recommendations
Recent media attention has highlighted a series of high-profile security breaches, which have affected U.S. government agencies and their contractors, and severely damaged the public trust and confidence in our federal government.
0 comments
0 recommendations
Administrative, Technical, and Physical Safeguards Needed to Protect and Ensure the Proper Handling of Personally Identifiable Information (PII)
0 comments
0 recommendations
The Center for Cyber and Homeland Security (CCHS) at GW is addressing key cybersecurity and homeland security policy research and analysis.
0 comments
0 recommendations
­