Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
In Depth Show Blog - Aug. 8, 2013
Thursday - 8/8/2013, 7:07pm EDT
Hoechst also discusses a recent post he wrote for the Agilex blog "Me & My Data."
Goats have invaded the historic Congressional Cemetery in Southeast D.C. It's the final resting place of former FBI Director J. Edgar Hoover and other notable federal executives and members of Congress. The goats are working around the clock over the next several days to get rid of weeds and plants. Lauren Maloy, program director at Congressional Cemetery, tells Federal News Radio's Shefali Kapadia where the idea for the goats came from.
Director of the Office of Economic Analysis, Evaluation, and Modeling
Office of the National Coordinator for Health Information Technology, HHS
Hospitals and other health care providers are using electronic health records more than ever. Usage rates are up in all areas of use. Michael Furukawa, director of the Office of Economic Analysis, Evaluation, and Modeling in the Office of the National Coordinator for Health Information Technology at the Department of Health and Human Services, explains why the new numbers are good news for HHS.
Internet Security Alliance
Eight new incentives for the private sector might become part of the federal cybersecurity framework the National Institute of Standards and Technology is developing. The goal is to entice the private sector to adopt federal cyber standards to make their networks safer.
Commander, Contingency Command Post One (Task Force-51)
U.S. Army North
U.S. Northern Command is preparing for something they hope never happens. Their Vibrant Response 13-2 exercise is preparation for a major incident response within the borders of the United States.
Chairman, Operations and Logistics Management Area and Academic Associate of the Logistics Curriculum
Naval Postgraduate School
Recycling old equipment could help the Defense Department save millions of dollars. The trick is changing the culture surrounding Defense supply systems.
Federal News Radio
Federal managers hear the phrase "do more with less" all the time. But some senior agency officials are finished with that cliché. Being smarter with less is a concept becoming more popular across government.
Director of Legislative Affairs
Truman Project and Center for National Policy
Specializations under the umbrella of cybersecurity make formulating policy around cyber harder than ever. As cyber splinters into subspecialties like cyber espionage, cyber warfare and others, it's influencing areas of policy making that haven't had a technological component before. Matthew Rhoades is Director of Legislative Affairs at the Truman Project and Center for National Policy and principal author of the Truman Security Briefing Book. Their book includes a look at cyber policy in today's world. He says the cyber landscape is more complicated than ever.
Federal News Radio
The Defense Department is in the first stages of implementing a mobile technology infrastructure that will serve the entire military. As they set down that path, officials say they desperately want to avoid repeating the practices military services used when they built their traditional, wired networks.
- At Education
Department, a whale of a phishing expedition (Federal Times)
- How hackers infiltrated
federal agency (Federal Times)
- BlackBerry Awarded
"Authority to Operate" on U.S. Department of Defense Networks (BlackBerry)
- IRS postpones Aug. 30 furlough day (Federal
- DHS building
actionable response plans for cyber attacks on critical infrastructure
- Same-sex spouses may get military benefits (Federal News Radio)