Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
In Depth Show Blog - May 2
Thursday - 5/2/2013, 7:57pm EDT
Thursdays at 3 p.m.
Tiffany Jones, director of public sector strategy for Symantec, joins Industry Chatter with Francis Rose to information security and management. While many agencies are attuned to the cybersecurity threat, the concept of better managing information throughout its lifecycle is one key area that agencies may be missing, Jones said.
Fluet, Huber & Hoang
Winning a bid protest is usually the prize companies shoot for. But protests aren't necessarily winner-take-all. Lee Dougherty, a partner at Fluet, Huber & Hoang, joins In Depth why second place matters when it comes to bid protests.
Second place matters in protest decisions (related link)
Senior Research Fellow, Institute for National Strategic Studies
National Defense University
U.S. military forces around the world are in a transition phase. The Defense Department is balancing a drawdown with a redeployment to the Pacific region. Frank Hoffman, senior research Fellow at the Institute for National Strategic Studies at the National Defense University, took part ina panel discussion at the Center for Strategic and International Studies this week to explore the situation. Hoffman joins In Depth to discuss how DoD can fit modernization efforts into the current budget uncertainty.
Senior Security Adviser
It's hard to patch holes in your agency's cybersecurity shield if you don't even know they exist, a lesson the Army is struggling with. But a seven-step solution might be all they need, according to Chester Wisniewski. He joins In Depth to discuss a recent Army inspector general report on the service's mobile-device management strategies.
Mobile device security in the US military comes under fire (related link)
From Our Reporters:
- Executive Editor Jason Miller on new cyber standards for iPhones, Androids and BlackBerry devices coming from the Chief Information Officers Council and the Homeland Security Department ... (Click here to read his report)
- DoD Reporter Jared Serbu on the Defense Department's plan to roll out as many as 100,000 new mobile devices by the end of the year and a big investment in a DoD app store ... (Click here to read his report)