Thursday, February 14, 2013

White House Cybersecurity Order: What It Means; Tough Work Ahead

If you have trouble viewing this email, read the online version.

InformationWeek Government
Join the community
Facebook Twitter LinkedIn
  Thursday, February 14, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist Cybersecurity Executive Order Leaves Tough Work Undone
By J. Nicholas Hoover
Government and industry must work together in challenging new ways to implement the White House's executive order on cybersecurity, top federal officials said Wednesday.

White House Cybersecurity Executive Order: What It Means
The White House late Tuesday issued a long-awaited executive order to bolster the nation's cyber defenses. But that order leaves some questions unanswered.

Federal CIO Details Concerns On Looming Budget Cuts
With huge automatic budget cuts looking increasingly likely, federal CIO Steven VanRoekel and other officials are discussing the effects of sequestration on government IT plans.

IBM-Backed High School Gets Obama Plaudits
P-TECH, a partnership among New York Public Schools, IBM and the City University of New York wins praise for boosting technical education with combined high school and associate's degree.

Does Health IT Safety Need New Regulatory Body?
Recent Department of Health and Human Services proposal says no; new think tank report agrees with HHS stance.

NASA Outlines Space Tech Investment Plan
Strategic Space Technology Investment Plan details NASA's development priorities for the next four years.

Feds Want Single Mobile Management Platform
To help accelerate federal adoption of smartphones, General Services Administration plans to offer a government-wide mobile management tools platform.

ALSO SEE
NASA Outlines Space Tech Investment Plan
Feds Want Single Mobile Management Platform
Research: Security Staffing Survey
Improving DevOps Collaboration in Government
10 Best Android Apps Of 2012
Secure Access: Next Steps In Identity Management
2013 InformationWeek Government IT Innovators

Download our iPad App

JOIN THE CONVERSATION
Posted By ACM:
"I'm wary about mandatory standards, because the tricky bit is auditing and enforcement of those standards. However, I was pleased to see the caveat that they would be 'outcome-based and technology-neutral.' Whether that translates into robust and broadly implemented risk management practices remains to be seen."
In reply to: "Cybersecurity Executive Order Leaves Tough Work Undone"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK'S LATEST DIGITAL ISSUE
Terabytes are growing into petabytes: The era of big data has arrived in government. Make sure you have a plan to keep up and the skills to make it work.

ALSO: Federal gun control won't succeed without an IT overhaul.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Security Staffing Survey
Hiring the wrong security pro can be a costly mistake that could set your company back years in terms of risk reduction. But finding the right person isn't easy. But don't despair. We'll walk you through the steps you need to take to find the best security professionals.
Download Now (Registration Required)

Featured Report
Strategy: Building and Maintaining Database Access Control Permissions
Knotted and complex database access permissions are among the biggest threats to enterprise data security. In this Dark Reading report, we examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations thoughtfully and effectively grant privilege when and where it is needed -- and only when and where it is needed.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Improving DevOps Collaboration in Government
The past several years have been a game-changer for government at all levels. Find out why many have taken the first step by automating, standardizing and collaborating on tasks that are performed across both development teams, and the operations team, a capability commonly referred to as DevOps.
Download Now (Registration Required)


Cloud-Based Email Archiving: A Practical Guide
In this whitepaper, we detail the issues involved in email archiving, consider best practices,and present a solution that emphasizes scalable cloud-based storage, secure access to assets, and high availability.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Salesforce.com Secrets: 8 Apps Help You Do More
Is your Salesforce.com app mix keeping up with your company's business growth? One rapidly growing midsize company shares a look at its blend of turnkey and custom apps.

Nexus Devices Getting Android 4.2.2, Google Now Widget
Android 4.2.2 update hits some Nexus devices, as details leak about a new widget that could make Google Now more powerful.

Microsoft's Big Data Strategy: An Insider's View
Microsoft executive Dave Campbell outlines plans for Hadoop, machine learning, high-performance computing and data and analytic offerings on Azure.

Microsoft Surface Pro: Right For You?
Microsoft's business-friendly Windows 8 tablet-laptop hybrid isn't perfect. From battery life to weight considerations, we break down whether Surface Pro will suit your needs.





MORE NEWS  
 
WEBCASTS
Secure Access: Next Steps In Identity Management
Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. In this interactive editorial webcast on Thursday, February 21, 2013, we will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek Government IT Innovators
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes?
Nominate By April 12



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment