Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The service's new acquisition strategy tries to imagine the Army's needs over the next three decades as the focus shifts away from large counterinsurgency and stability operations.
Two brigades of the Army's 10th Mountain Division are training on a ready-to-go set of networking capabilities as they prepare to deploy to Afghanistan. The IT comes out of the Network Integration Evaluation process.
DISA wants a secure mobile device manager and app store to support at least 162,000 Apple and Android mobile devices. Contract would begin next spring.
Defense Secretary Leon Panetta said the financial health of service members is important for troop readiness. A new report by the Consumer Financial Protection Bureau details potential problems service members are facing.
After a decade of heavy land war, Marine Corps turns to energy efficiency as a way to lighten its load and return to its expeditionary maritime roots. The service already rolled out four technologies that reduce the amount of energy a marine uses. The Marines Corps also is spending hundreds of millions of dollars on developing and testing other energy efficient equipment.
Chris Devlin-Young is a Coast Guard veteran, who became partially paralyzed when his plane ran into a mountainside in 1982. Since then, he's won numerous world medals in the Paralympic sport of monoskiiing and does counseling work with wounded veterans.
The Defense Information Systems Agency sees itself as a safety valve for increasing pressure on military services' IT budgets. At a meeting of CIOs last week, DISA told the military services they could offload commodity IT services to their data centers.
Current definitions of cyberspace have led to confusion about roles, responsibilities, lanes in the road, a top Air Force general said Thursday. Senior leaders will convene a summit in November to zero-in on a common understanding of cyber.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
As service transitions to Air Force and DoD enterprise IT models, defining what technology services should be shared is still on the to-do list. The service's AFNet program is the umbrella effort to centrally-manage many commodity IT functions.
The Defense Department has marked the week of Oct. 1 as Absentee Voting Week. It's urging service members living overseas to register to vote and to take care of absentee balloting while there's still time for mail to make its way to and from local election jurisdictions.
Procurement will start with management of 5,000 mobile devices, plus app stores for consumers inside and outside of VA. The agency awarded a three-year, $9.3 million deal to Longview International Technology Solutions to build and manage the technology in the cloud.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.
For the first time, review panels will question not just new IT projects, but also money spent on maintaining older technologies. The changes are part of an overhaul Congress ordered the Pentagon to implement with regard to how it handles investment review boards, the internal overseers that federal agencies use to greenlight spending for business IT systems.
Should-cost management and affordability-cap elements of acquisition overhaul have worked well, DoD's acquisition chief says. But workforce has overreacted to Pentagon's urging toward more fixed-price contracts.
Frank Kendall, undersecretary of defense for Acquisition, Technology and Logistics, discusses which elements of the Better Buying Power Initiative have been successful. Plus, Henry Sienkiewicz, vice chief information assurance executive at the Defense Information Systems Agency and Roger Greenwell, DISA's director for field security operations join us to talk about the agency's plan to build on its track record of information assurance training and develop modular, DoD-wide training for specific cyber roles across the military services.