Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
In Depth Show Blog - Aug. 8, 2013
Thursday - 8/8/2013, 7:07pm EDT
Hoechst also discusses a recent post he wrote for the Agilex blog "Me & My Data."
Goats have invaded the historic Congressional Cemetery in Southeast D.C. It's the final resting place of former FBI Director J. Edgar Hoover and other notable federal executives and members of Congress. The goats are working around the clock over the next several days to get rid of weeds and plants. Lauren Maloy, program director at Congressional Cemetery, tells Federal News Radio's Shefali Kapadia where the idea for the goats came from.
Director of the Office of Economic Analysis, Evaluation, and Modeling
Office of the National Coordinator for Health Information Technology, HHS
Hospitals and other health care providers are using electronic health records more than ever. Usage rates are up in all areas of use. Michael Furukawa, director of the Office of Economic Analysis, Evaluation, and Modeling in the Office of the National Coordinator for Health Information Technology at the Department of Health and Human Services, explains why the new numbers are good news for HHS.
Internet Security Alliance
Eight new incentives for the private sector might become part of the federal cybersecurity framework the National Institute of Standards and Technology is developing. The goal is to entice the private sector to adopt federal cyber standards to make their networks safer.
Commander, Contingency Command Post One (Task Force-51)
U.S. Army North
U.S. Northern Command is preparing for something they hope never happens. Their Vibrant Response 13-2 exercise is preparation for a major incident response within the borders of the United States.
Chairman, Operations and Logistics Management Area and Academic Associate of the Logistics Curriculum
Naval Postgraduate School
Recycling old equipment could help the Defense Department save millions of dollars. The trick is changing the culture surrounding Defense supply systems.
Federal News Radio
Federal managers hear the phrase "do more with less" all the time. But some senior agency officials are finished with that cliché. Being smarter with less is a concept becoming more popular across government.
Director of Legislative Affairs
Truman Project and Center for National Policy
Specializations under the umbrella of cybersecurity make formulating policy around cyber harder than ever. As cyber splinters into subspecialties like cyber espionage, cyber warfare and others, it's influencing areas of policy making that haven't had a technological component before. Matthew Rhoades is Director of Legislative Affairs at the Truman Project and Center for National Policy and principal author of the Truman Security Briefing Book. Their book includes a look at cyber policy in today's world. He says the cyber landscape is more complicated than ever.
Federal News Radio
The Defense Department is in the first stages of implementing a mobile technology infrastructure that will serve the entire military. As they set down that path, officials say they desperately want to avoid repeating the practices military services used when they built their traditional, wired networks.
- At Education
Department, a whale of a phishing expedition (Federal Times)
- How hackers infiltrated
federal agency (Federal Times)
- BlackBerry Awarded
"Authority to Operate" on U.S. Department of Defense Networks (BlackBerry)
- IRS postpones Aug. 30 furlough day (Federal
- DHS building
actionable response plans for cyber attacks on critical infrastructure
- Same-sex spouses may get military benefits (Federal News Radio)