Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
In Depth interviews - November 10
Monday - 11/19/2012, 4:57pm EST
Paul Royal — Research Scientist, Georgia Tech's College of Computing
Knowing what the biggest cybersecurity challenges could be next year could help you prepare for them. Researchers at Georgia Tech found four threats that stand above the rest in potential danger to our computer systems.
Paul Royal, a research scientist in the College of Computing at Georgia Tech and associate director of the Georgia Tech Information Security Center, joins In Depth to discuss the cyber threats everyone will be talking about in 2013.
Emerging Cyber Threats Report 2013 (related link)
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.
Retired Brig. Gen. David Reist — Vice President of Strategy and Planning, Potomac Institute for Policy Studies
Presidential Policy Directive 20 is the secret cybersecurity doctrine document that the White House updated in October. Last week, we spoke with Jim Lewis of the Center for Strategic and International Studies about what we know so far about its goals.
Now the question is what this means for the Defense Department. Retired Marine Brig. Gen. David Reist, the vice president of strategy and planning at the Potomac Institute for Policy Studies, joins In Depth to discuss what the directive means for the Defense Department.
Obama Signs Secret Cybersecurity Directive (related link)
This story is part of Federal News Radio's daily DoD Report. For more defense news, click here.
Debra Draper — Director of Health Care Issues, Government Accountability Office
About one in 12 service members returning from the battlefield need medication to help with their physical and mental transition. But a recent report from the Government Accountability Office found that the Defense Department does not have a formal policy for transitioning service members' medication needs when they switch to Veterans Affairs medical care.
Debra Draper, director of health care issues at GAO, joins In Depth to discuss ways to smooth the transition.
Medication Needs during Transitions May Not Be Managed for All Servicemembers (link to the GAO report)
Keith Willingham — Director, Combined Federal Campaign
As the swath of destruction of Superstorm Sandy in the Northeast was becoming fully known, Office of Personnel Management Director John Berry allowed for special solicitation of federal employees at the workplace to support charities working with victims of the storm. But time is running out if you want to take part. Federal News Radio's Jared Serbu spoke with Keith Willingham, the director of the Combined Federal Campaign to see how the direct donations vary from CFC donations.
Also on the show:
Cyber experts envision updates for OMB's cyber rules (Federal News Radio)