Problems viewing? View as a web page
 
 
Nextgov Nextgov CXO Briefing
 
 
January 17, 2022
 
 
Newly Uncovered Emails Intensify Republican Senator's Unease About DOD's Cloud Contracts
// Brandi Vincent
A senior senator continued a back-and-forth with auditors over the Defense Department's now-canceled JEDI contract.
 
 
House FISMA Reform Would Empower Federal CISO With Budgeting Authority
// Mariam Baksh
Corresponding Senate legislation doesn't mention the federal chief information security officer but shares other key elements—including a shorter incident reporting window—with a discussion draft issued by the House Oversight and Reform Committee.
 
 

Connecting the Battlefield in the Age of Contested Communications

Enterprise cloud architectures are critical in the DoD's strategy for deterring major conflicts, but special obstacles are present in implementing cloud solutions that the private sector does not face: the enemy gets a vote, and modern electromagnetic warfare techniques mean that connectivity to the cloud can't be presumed on the battlefield. On January 27, Defense One will bring together experts to explore how the DoD is re-inventing cloud connectivity from the ground up to ensure the future of rapid, overwhelming force. 

Register Today

 
 
FBI Officials Clarify What the Bureau Wants in Cyber Incident Reporting Bill
// Mariam Baksh
However the legislation is eventually passed, CISA plans to share reports with the FBI and other agencies, a Homeland Security official said.
 
 
Report Outlines How Government Contact Centers of Tomorrow Should Operate
// Frank Konkel
Contact centers engage tens of millions of Americans each year.
 
 
Creepy, Cool and Coherent: Potential Government Tech Shines at CES 2022
// John Breeden II
From humanoid robots to zero-emissions drones, CES was filled with lots of tech that may be relevant to government soon.
 
 
FCC Chair Proposes Updating Data Breach Reporting Requirements
// Mariam Baksh
The Commission is still waiting for an empty chair to be filled as observers call for a vote on Biden nominee Gigi Sohn.
 
 
How the Log4j Vulnerability is Forcing Change in Federal Cybersecurity Policy
// Mariam Baksh
Officials say agencies have demonstrated more dedication than ever in addressing a bug with astronomical reach, but organizations are at the mercy of product vendors to issue the patches they need to implement.
 
 

Connecting the Battlefield in the Age of Contested Communications

Enterprise cloud architectures are critical in the DoD's strategy for deterring major conflicts, but special obstacles are present in implementing cloud solutions that the private sector does not face: the enemy gets a vote, and modern electromagnetic warfare techniques mean that connectivity to the cloud can't be presumed on the battlefield. On January 27, Defense One will bring together experts to explore how the DoD is re-inventing cloud connectivity from the ground up to ensure the future of rapid, overwhelming force. 

Register Today

 
follow us
   
  NEXTGOV // CUSTOMER SERVICE // CONTACT US // PRIVACY POLICY // UNSUBSCRIBE  
 
This message was sent from Nextgov to {email}. You have been sent Nextgov CXO Briefing because you have opted in to receive it. Note: It may take our system up to two business days to process your unsubscribe request and during that time you may receive one or two more newsletters.

Thank you for reading Nextgov CXO Briefing.

GovExec, 600 New Hampshire Avenue NW, Washington, DC 20037