Here's a review of the top news stories you should pay attention to this week:
Rep. Loretta Sanchez's Call for Meeting of the Minds Over Fed Cybersecurity
FBI Taps 18-Year Agency Veteran to Head Cyber Division
Bill to Restructure NIST Heads to the House Floor
International Cyberspace: The Wild West
Listen to a round up of GovInfoSecurity.com's most fascinating content created in April, including:
Beyond Firewalls and Encryption: FAA Infosec Pilot Showcases Multi-Disciplinary Approach
Peter Mell: Speeding Cloud Adoption Through New FedRAMP Initiative
Bob Maley: Why I Spoke Publicly About Cyber...
Interview with Allan Bachman of the Association of Certified Fraud Examiners
The magnitude of fraud schemes has grown - the scale and the losses. But the basics of fraud investigation remain sound. And if there's one thing people should know up front, says Allan Bachman of the Association of Certified Fraud...
Cyber thieves shuttering ATMs and enemies disrupting battlefield IT systems are among the concerns of the California congresswoman whose influence on cybersecurity is growing as chair of the House Armed Services Subcommittee on Subcommittee on Terrorism, Unconventional Threats and Capabilities.
Peter Mell, Vice Chairman, Federal Cloud Computing Advisory Council, and Senior Computer Scientists, National Institute of Standards and Technology
Add the term FedRAMP to the federal government lexicon; it's a program under development that could ease the adoption by agencies of new information technologies and...
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...
Interview with Prof. Sree Sreenivasan of the Columbia Graduate School of Journalism
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security...
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses: