Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Looming budget cuts, expanded missions, greater public demand, and a changing workforce--huge challenges for today's government agency leaders. These challenges present opportunities to maximize value and do better with less. With guidance coming from many directions, how can leaders determine what works best for their agencies? What are the "game-changers" in the arena of driving value? And how can leaders expedite value optimization?
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
For the past 25 years, reforming the American healthcare system has been a national priority. As part of this effort, this Administration has incentivized the use and adoption of health information technology, primarily in two forms - promoting the meaningful use of electronic health records and creating health information exchanges to facilitate greater sharing of information. For patients, unlocking health information creates the promise of greater access, convenience, and mobility in receiving healthcare services. For providers and payers, reducing barriers to information flow is one key to improving healthcare quality and reducing costs. But this raises several critical questions: Will doctors and patients embrace electronic health records and the secure exchange of health information? How might mobile applications fundamentally transform how we conceive of the healthcare system in the future? How should healthcare professionals embrace next-generation technologies along with the need for privacy and security? What will this health information technology ecosystem look like in 10 years, and what do we need to do to plan for its success?
The cyber revolution is just the latest in a series of waves of ‘creative destruction' that arise when disruptive technologies, new organizational models, and innovative processes converge to spawn new sources of national power. Throughout history, nations that successfully harnessed revolutionary technologies and mastered new industries emerged as global powers on the international stage, strengthening their military power, transforming their economies, and enriching their societies. Cyber technologies hold the same promise, but also raise several critical questions: which nations will emerge as the leading cyber powers of the 21st century? What will be the primary sources of their comparative cyber power - military, economic, or cultural? How significant will be the roles of non-state actors (e.g., criminal syndicates, terrorist groups, multinational corporations, non-governmental organizations) in the future cyber balance of power? Finally, what should the role of the US Government be as this new balance of power emerges?
October 25th, 2011 at 12 PM
A distinguished panel of top experts from government and industry, will explore market incentives that may or may not currently exist to stimulate greater corporate investment in cybersecurity protection measures. Such business drivers may include the consideration of relating proactive cybersecurity activity to a favorable valuation of company performance, liability protection measures such as insurance coverage for cyber vulnerabilities, or statutory liability protection. The panelists will explore the likelihood that these or other market incentives may emerge across industry and government to enhance our collective defense against sophisticated cyber threats.
Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. The firm provides services primarily to the US government, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy, organization, engineering, operations, technology, and analytics. To learn more, visit www.boozallen.com