Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
In Depth interviews - November 10
Monday - 11/19/2012, 4:57pm EST
Paul Royal — Research Scientist, Georgia Tech's College of Computing
Knowing what the biggest cybersecurity challenges could be next year could help you prepare for them. Researchers at Georgia Tech found four threats that stand above the rest in potential danger to our computer systems.
Paul Royal, a research scientist in the College of Computing at Georgia Tech and associate director of the Georgia Tech Information Security Center, joins In Depth to discuss the cyber threats everyone will be talking about in 2013.
Emerging Cyber Threats Report 2013 (related link)
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.
Retired Brig. Gen. David Reist — Vice President of Strategy and Planning, Potomac Institute for Policy Studies
Presidential Policy Directive 20 is the secret cybersecurity doctrine document that the White House updated in October. Last week, we spoke with Jim Lewis of the Center for Strategic and International Studies about what we know so far about its goals.
Now the question is what this means for the Defense Department. Retired Marine Brig. Gen. David Reist, the vice president of strategy and planning at the Potomac Institute for Policy Studies, joins In Depth to discuss what the directive means for the Defense Department.
Obama Signs Secret Cybersecurity Directive (related link)
This story is part of Federal News Radio's daily DoD Report. For more defense news, click here.
Debra Draper — Director of Health Care Issues, Government Accountability Office
About one in 12 service members returning from the battlefield need medication to help with their physical and mental transition. But a recent report from the Government Accountability Office found that the Defense Department does not have a formal policy for transitioning service members' medication needs when they switch to Veterans Affairs medical care.
Debra Draper, director of health care issues at GAO, joins In Depth to discuss ways to smooth the transition.
Medication Needs during Transitions May Not Be Managed for All Servicemembers (link to the GAO report)
Keith Willingham — Director, Combined Federal Campaign
As the swath of destruction of Superstorm Sandy in the Northeast was becoming fully known, Office of Personnel Management Director John Berry allowed for special solicitation of federal employees at the workplace to support charities working with victims of the storm. But time is running out if you want to take part. Federal News Radio's Jared Serbu spoke with Keith Willingham, the director of the Combined Federal Campaign to see how the direct donations vary from CFC donations.
Also on the show:
Cyber experts envision updates for OMB's cyber rules (Federal News Radio)