Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Joint Chiefs Chairman addresses "our way forward in Afghanistan" for foreign media.
Several departments are out ahead of the OMB mandate to consolidate data facilities over the next four years. Energy is starting small to show business owners they will get the same level of service under the new setup. Other agencies see green in cutting back on the centers-both money and energy efficiency.
A preview of Federal Security Spotlight with HHS' Tom Shankweiler.
The collaborative tool is an example of how agencies can share information securely. Chris Bronk, a fellow for information technology policy at the James Baker Institute for Public Policy at Rice University, explains how Diplopedia works.
Agency's policy head discusses the first-ever four-year review of the Department's operations, future budgets.
The lawyer who represented the New York Times in the Pentagon Papers case writes about the differences between the two document leaks.
The Washington Post reports on the vast amount of data contained in Net-Centric, whether it belonged there or not.
The New York Times reports on U.S. diplomats' efforts to market U.S. items, such as jets, to foreign countries, revealed by the WikiLeaks cables.
With the report now completed, what changes are in store for the nation's development and diplomacy missions? Jon Allen and Cheryl Steele, senior associates at Booz Allen Hamilton share their insights
The company will provide engineering, security and operations and maintenance services under the Vanguard program. The 10-year contract is one piece of a larger IT consolidation effort State is in the middle of completing.
The State Department's Office of the Coordinator for Cyber Issues will focus on cybersecurity.
Secretary of State Hillary Rodham Clinton on Wednesday unveiled a reorganization plan for the State Department that include a new coordinator for cyber security.
The New York Times and the Economist report on the U.S. government's ability to keep a secret after the WikiLeaks dumps of classified information.
Lawmakers have urged President Obama to expand the State Department's cyber authority.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that the WikiLeaks cable reveal locations that are of national security interest.
One of the top IT officials at the State Department wants to push the boundaries of using biometrics to determine who gets visas and passports in the United States.
Lovisa Williams writes in her blog that Gov 2.0 is not in a slump but in metamorphosis.
Josh Goldstein, co-coordinator of the Apps 4 Africa contest, joined the DorobekINSIDER to describe how the contest taps into local talent and the widespread use of mobile devices to help solve the communities' social and economic problems.
Adam Conner, the Washington DC associate manager for privacy and global public policy at Facebook, participated in the State Department's Panel on Social Media and Cybersecurity. He said State has done a great job of creating social media experts.