July 26 Cybersecurity II
FCW reporter Ben Bain takes a closer look at the Defense Department’s new Cyber Command and how the creation of this organization reflects an evolution in U.S. government views on cyberwarfare, including how that thinking plays out in doctrine and the deployment of new defensive and offensive capabilities.
Writer: Ben Bain, email@example.com
Posted on Jun 18, 2010 at 12:20 PM0 comments
July 12 The Busy Executive: Mastering New Responsibilities
More and more agencies are creating the position of chief technology officer. What exactly are the responsibilities of the CTO and do they vary from agency to agency? Is the CTO really a deputy CIO, or does the CTO have independent responsibilities? Our story will look at these issues, as well as what kinds of skills and backgrounds are required to be a successful CTO.
Writer: Alan Joch, ajoch AT worldpath DOT net
Posted on May 21, 2010 at 12:20 PM0 comments
June 28 Emerging Technologies: IT Security
The Consensus Audit Guidelines, also known as the 20 critical security controls, are a new approach to prioritizing IT security spending and attention. This story will provide agencies with tips for incorporating the guidelines into their security practices and technology roadmap/investment plans.
Writer: John Moore, jmwriter AT twcny DOT rr DOT com
Posted on May 14, 2010 at 12:20 PM0 comments