Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
Federal News Countdown: PortfolioStat revamp, new cyber threats
Friday - 3/29/2013, 6:24pm EDT
Karen Evans' stories
#4 Fed IT Funds Circle Drain Due to Poor Procurement Policies
From E-Commerce Times:
It may seem like a simple thing to fix -- if the U.S. government wants more vendors to compete for contracts, just ask more companies to take part. However, those looking to reform the procurement process are running into snags that favor the status quo, and a new survey shows just how much money is wasted. A greater emphasis on open standards and boosting the role of CIOs are two possible solutions now being studied.
#3 VanRoekel Revamps IT Portfolio Review Process
From Federal Times:
The White House is revamping its initiative to streamline how federal agencies buy information technology. The PortfolioStat program so far has saved the government roughly $300 million since it was launched one year ago this month, federal Chief Information Officer Steven VanRoekel told Nextgov in an interview Wednesday.
#2 U.S. Writes Its Worries About Buying IT Gear From China Into Law
From All Things D:
The U.S. government officially remains concerned about the possibility of cyber attacks from China. And it has quietly imposed new restrictions on the information technology gear that certain branches of the government buy.
#1 Risk assessment and automated monitoring are keys to federal cybersecurity, report says
Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report (.pdf) released Tuesday. SafeGov developed two programs to automate monitoring programs and establish a threat baseline.