Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Mobile Strategy - Air Force
Tuesday - 12/4/2012, 12:32pm EST
Department of the Air Force
Does your department or agency have a mobile strategy or policy?
An Air Force mobile strategy is being developed. Estimated completion date is during the first quarter of 2013. An Air Force Guidance Memorandum (AFGM) approved by SAF/Chief Information Officer (CIO) A6 on Sept. 5 provides Air Force guidance for the employment of optional Blackberry Security Technical Implementation Guide (STIG) Security Setting Modifications, Bluetooth audio capabilities and deployment of non-enterprise activated Commercial Mobile Devices (CMD) and applications as outlined by the DoD CIO in several memos.
Bring-Your-Own-Device?The Air Force is evaluating Dual Persona devices that support personal and business usage. The advent of virtualization and application sand-boxing will make this tenable within the next couple of years. Along the lines of Dual Persona, the service will continue to ensure the confidentiality, integrity and availability of its sensitive but unclassified information. While the specific security architecture is being defined by our Cyberspace Operators at 24 AF, the architecture must ensure the appropriate PKI security, FIPS encryption, segmented data storage, etc. are part of the architecture.
View more mobile strategies from the following agencies: Air Force | Commerce | Defense | Energy | EPA | GSA | HHS | Homeland Security | HUD | Interior | Justice | Labor | NARA | NRC | NSF | OPM | SBA | State | Transportation | USAID | VA |