Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The collaborative tool is an example of how agencies can share information securely. Chris Bronk, a fellow for information technology policy at the James Baker Institute for Public Policy at Rice University, explains how Diplopedia works.
Agency's policy head discusses the first-ever four-year review of the Department's operations, future budgets.
The lawyer who represented the New York Times in the Pentagon Papers case writes about the differences between the two document leaks.
The Washington Post reports on the vast amount of data contained in Net-Centric, whether it belonged there or not.
The New York Times reports on U.S. diplomats' efforts to market U.S. items, such as jets, to foreign countries, revealed by the WikiLeaks cables.
With the report now completed, what changes are in store for the nation's development and diplomacy missions? Jon Allen and Cheryl Steele, senior associates at Booz Allen Hamilton share their insights
The company will provide engineering, security and operations and maintenance services under the Vanguard program. The 10-year contract is one piece of a larger IT consolidation effort State is in the middle of completing.
The State Department's Office of the Coordinator for Cyber Issues will focus on cybersecurity.
Secretary of State Hillary Rodham Clinton on Wednesday unveiled a reorganization plan for the State Department that include a new coordinator for cyber security.
The New York Times and the Economist report on the U.S. government's ability to keep a secret after the WikiLeaks dumps of classified information.
Lawmakers have urged President Obama to expand the State Department's cyber authority.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that the WikiLeaks cable reveal locations that are of national security interest.
One of the top IT officials at the State Department wants to push the boundaries of using biometrics to determine who gets visas and passports in the United States.
Lovisa Williams writes in her blog that Gov 2.0 is not in a slump but in metamorphosis.
Josh Goldstein, co-coordinator of the Apps 4 Africa contest, joined the DorobekINSIDER to describe how the contest taps into local talent and the widespread use of mobile devices to help solve the communities' social and economic problems.
Adam Conner, the Washington DC associate manager for privacy and global public policy at Facebook, participated in the State Department's Panel on Social Media and Cybersecurity. He said State has done a great job of creating social media experts.
Lovisa Williams, the deputy director for State's International Information Programs Bureau of Innovative Engagement, said her office spends about 50 percent of their time educating feds on the risks of social networking tools.
Secretary of State Hillary Clinton encourages innovators to use technology to help the world's most pressing problems. The idea is already in practice with the Apps 4 Africa contest, which State helps fund.
Alec Ross is the Senior Advisor for Innovation in the Office of Secretary of State Hillary Clinton said 21st century statecraft already has provided some short-term successes.