Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Terry Verigan, vice president of CompuCure, will discuss best practices for small businesses that do work for the federal government.
December 24, 2013
GSA's Mark Day said agency preferences in how they buy cloud services are clear, and point toward the need for a cloud broker.
Federal News Radio surveyed more than a dozen current and former federal officials about what technology and acquisition stories stood out last year.
GSA tests new energy-saving technologies in its own buildings, to help the government save money and manufacturers realize opportunities in the commercial sphere.
Many electronic devices contain hazardous materials that can cause environmental damage when sent to landfills. The Postal Service's BlueEarth Recycling Program makes it convenient and safe for agencies to dispose of electronic waste.
Documents obtained by Federal News Radio show VA's financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
Join Federal News Radio on Monday, Jan. 13 at 1 p.m. for a live online chat with Dave Bowen, the director of healthcare IT and CIO of the Defense Health Agency.
Documents obtained by Federal News Radio show VA failed for the 15th year in a row its consolidated financial statement audit with regard to security controls.
Ty Cooper, the OGE chief information officer, said a new voice over IP, virtual desktop interface and the move to Windows 7 will enable employees to take advantage of more workplace capabilities.
GSA says its problem-plagued System for Award Management is now working, but its failures have pushed agency officials to pursue a new path to consolidate the government's approach to procurement data.
The Homeland Security Department's CIS is using a continuous delivery model where it automates reviews of software code to ensure security and quality. DHS is using a similar approach for mobile apps called the Carwash, where it's checking the code to compliance with specific requirements.
Kevin Kelly, CEO of LGS Innovations, will discuss how his company can help improve network security at your agency.
December 17, 2013
You've heard of email and snail mail - but what about jail mail? It is something that will soon be on the way to some inmates at the Pasco County Jail in Florida. Sheriff Chris Nocco says 77 kiosks are being set up in the jail housing units. The set-ups will let inmates read and send email to those who have approved accounts. The sheriff says there will be no cost to taxpayers for the service. While inmates will be able to get email and photos, they will only be able to send email, not photos. And - as is the case with regular mail, deputies will be monitoring inmates email.
A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat. Theodore H. Moran, a professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.
Tell us how you use Twitter, Facebook, LinkedIn and Flickr and what you'd like to see on social media from Federal News Radio.
An interagency review group determined having one leader for both organizations makes the most sense to get the mission done.
The Air Force's Service Development and Delivery Process aims to deliver data hosting, enterprise management, security and other IT functions as standards-based services to be used by the entire organization.
Crunch time: Health care sign-ups picked up in November but still far short as deadline nears
The annual policy legislation also doesn't merge the DoD CIO and deputy chief management officer.
Employees at the departments of Treasury, Homeland Security and State can use their HSPD-12 smart cards to log onto the intelligence community's unclassified sharing platform. Most recently, the departments of Health and Human Services, Veterans Affairs and the Justice Department's Bureau of Alcohol, Tobacco, Firearms and Explosives will have access to the tools and applications through their smart identity cards.