Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews on our daily show blogs.
Federal Drive Show Blog - May 9, 2013
Thursday - 5/9/2013, 10:15am EDT
vice president for cyber security
Alma Cole is a veteran of the federal government's cyber wars. He was the chief systems security officer at Customs and Border Protection and Department of Homeland Security. There he worked to improve information sharing among federal agencies as they battled threats such as the Conficker Worm.
Budget cuts are a mixed bag for federal contractors. Half of the top vendors earned more money from the government last year despite the financial squeeze. That's one finding from Bloomberg Government's new report on the 200 most powerful government contractors. Bloomberg Government analyst Evan Croen provides insight on the report.
(A subscription is required to access articles on BGov.com.)
chairman and co-founder
The Chertoff Group
If the United States has learned anything since 9/11, it's that you can never let your guard down. And, the threat situation is constantly changing. Michael Chertoff, former DHS secretary, is now chairman and co-founder of The Chertoff Group, a global security advisory firm.
president and CEO
The problem of online identity management stands at the heart of many cybersecurity challenges the government faces. Yet the government still lingers over getting HSPD-12 and Transportation Worker Identity Card programs fully implemented. Plus, there's still no assured yet simple system for citizens to authenticate themselves to the government.
social media program manager
General Services Administration
We got a clear example of the power and dangers of social media a few weeks ago when hackers hijacked the Associated Press' Twitter account. They posted false news alerts about explosions in the White House. The tweets briefly caused the stock market to plunge. Now imagine if the victim wasn't a news organization, but a government agency. GSA social media lead Justin Herman joins us to explain what to do if your agency's Twitter account is attacked.
From Our Reporters
The Pentagon is putting the finishing touches on a package of proposals that would allow it to move at least some money between its programs during tough budget times. But even if Congress approves the request, it won't make a dent in the impact of sequestration. Federal News Radio's DoD Reporter Jared Serbu files this report.
In three weeks, agencies will have to check the Do Not Pay portal before they cut a check to a contractor or send money to citizens. Federal News Radio's Executive Editor Jason Miller says the website is missing critical data that could help prevent improper payments.
MORE FROM THE FEDERAL DRIVE
TSA officers, air marshals file legal warning over knives (Federal Times)
Most military sexual assault cases go unreported (Federal News Radio)
Former US official describes Libya attack (Federal News Radio)
Commander sees attitude problem with missile crew (Federal News Radio)
Panel votes to ban bonuses at Veterans Affairs (Federal News Radio)