Posts Tagged: assurance

Step-by-Step Guide to Getting Started With Security Governance

Article Posted on behalf of Vo Ballard of Cask, LLC. – If the word ‘governance’ sounds like a high level concept that is only applicable to high level managers, chances are you may be missing the cornerstone of a framework that guides and directs the why and how your organization conducts business. If you thinkRead… Read more »

Telos, ICS Partner to Host DHS Data Systems

Telos and ICS have partnered to help migrate the Department of Homeland Security’s data into a Telos-built information assurance management system. DHS’ Office of the Chief Information Officer has deployed Telos’ Xacta IA Manager into systems and agency components and automated the National Institute of Science and Technology’s risk management framework using that platform, TelosRead… Read more »

Lax Policies Keep Cyber Security Issues at Forefront

Originally Authored by Prem Iyer Posted to GovWinand Iron Bow TechSourceblogs In an earlier post, Preparing for the Fight, I discussed that most agencies are ill-prepared when it comes to protecting their assets against the latest cyber threats. This point was validated last month when the Government Accountability Office (GAO), as part of the FederalRead… Read more »

Robert Lentz to Speak at IA & Cyber Security Seminar in Norfolk, VA – October 15th

Keynote Speaker Robert Lentz, Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance & Chief Information Assurance Officer, U.S. Department of Defense has over 26 years of experience with the National Security Agency (NSA) in areas of financial management and technical program management. He has served as: Chief of the Space and NetworksRead… Read more »

Upcoming Event! Oct 22nd Bootable / Live Media Technical Exchange Meeting (TEM)

Bootable / Live Media Technical Exchange Meeting (TEM) Sponsored by the DISA CTO, Mr. Dave Mihelcic October 22, 2009 MITRE, Building 1 Auditorium McLean, Virginia Many DoD and Intel agencies are looking for ways to reduce the expense of removing attackers from their computer operating systems. In addition they are looking to operating systems thatRead… Read more »