Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
In Depth Show Blog - Jan. 2, 2013
Thursday - 1/2/2014, 4:10pm EST
Vice President and Chief Technology Officer
Your agency should move toward a more proactive cybersecurity posture in 2014. Continuous monitoring is the term most people use to describe how agencies should do things, but there are other terms too. The terms, though, are less important than the results. Scott Montgomery, vice president and chief technology officer of public sector at McAfee, was Francis Rose's guest on Industry Chatter.
Vice President of Enterprise Technologies and Services
The potential problems of adding mobile devices to a federal cloud system could outweigh their potential benefits. Dave Wennergren, vice president of Enterprise Technologies and Services at CACI and former assistant deputy chief management officer of the Defense Department, is writing about that intersection in his Top 3 for 2014.
1. The Nexus of Mobility and Cloud Computing. The power and peril of mobility/BYOD coupled with the promise of cloud computing could create a perfect storm as organizations grapple with fulfilling the pledge to provide the right person with the right information — from anywhere at any time. With a shift in approach to security, opportunities exist to both drive down costs through the effective use of cloud and mobile solutions as well as delivering more effective information sharing within and across organizations. The bringing together of mobile devices and cloud computing will also provide an opening to consider the potential disruptive force that BYOD could have on an organization — delighting the user, reducing the organization's costs and creating a changing mindset where the employee gets to pick out not only the car they drive and the suit they wear to work, but the computing device they use too!
2. 3-D Printing and Distance Support - Revolutionizing Maintenance and the Supply Chain. Some organizations are already recognizing the potential to both reduce costs and implement solutions faster by replacing labor and travel intensive maintenance solutions with Web-based distance support solutions for logistics/maintenance operations. With the continuing maturity of 3-D printing (including the move to use other materials like metal in addition to plastic), distance support maintenance solutions could be augmented by on-site "part fabrication" to dramatically speed up turnaround times and dramatically reduce costs. Beam me up, Scotty.
3. Data is King. Large organizations (public and private) are sitting on treasure troves of data that are still not being leveraged effectively for business intelligence and knowledge sharing. Efforts to decouple data from legacy applications, tag data to help provide data-level security (opening the door for the alignment of identity management, attribute-based access control and data) as well as leveraging advances in analytical tools to array data in more meaningful ways will make the difference between mission success or failure.
The problems with HealthCare.gov are fading, but the post-mortem on how they happened is just starting. Congress will look at those problems more when it comes back from recess next week. Federal News Radio's Tom Temin says he's not sure those lessons have sunk in across government.
Professor of Government Contracting Law
University of Baltimore Law School
Competition should get tougher this year for business with the federal government. Charles Tiefer, a professor of government contracting law at the University of Baltimore Law School and a former member of the Commission on Wartime Contracting, is writing about competition in contracting in his Top 3 for 2014.
1. The need for robust suspension and debarment.
2. The rise, and now the fall, of government employee furloughs.
3. The struggle over getting certified cost or pricing information (from contractors)
Vice President for Education and Outreach
Partnership for Public Service
Federal News Radio
The Homeland Security Department wants to build networks of trust with state, local and federal government partners as well as with international and private sector organizations. The goal is to make information sharing easier and more secure. One of the only ways to do that is through federated identity management. Federal News Radio's Jason Miller tells us how DHS is putting the pieces in place to ease the burden of managing so many different identities.
Also on the Show:
will soon see first pay raise in three years - but not all will benefit
(Federal News Radio)
- Mass-transit benefit
declines thanks to congressional inaction (Federal News Radio)
- DARPA's Grand Cyber Challenge (DoD)
- Repeal of Reductions in Military Retirement Benefits Made by Bipartisan Budget Act of 2013 (Congress)