Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The Senate Homeland Security and Governmental Affairs Committee members will introduce and markup the Federal Information Security Modernization Act of 2014 Wednesday. The bill would require OMB to rescind a major section of Circular A-130 in order to fix long-standing complaints with FISMA's reauthorization requirements.
Is your agency getting as much value out of its social media efforts as it could be? A new report offers tips for agencies looking to take advantage of the data that can be mined from Twitter, Facebook and other social media outlets.
Senate legislators will introduce and markup its version of the Federal IT Acquisition Reform Act (FITARA) Wednesday, with a focus on giving CIOs full IT budget and contracting authority. The House and Senate bills differ in several ways, including how to limit the title CIO.
The new Health and Human Services Secretary is revamping management of HealthCare.gov. Sylvia Burwell has appointed a new operations manager to closely supervise the website, and she plans to fill more management positions. The goal is to make sure this year's open season doesn't mirror the fiasco of when HealthCare.gov first opened for business last year. Elise Viebeck covers health care issues for The Hill Newspaper. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new moves.
Rafael Diaz is named as the new HUD chief information officer, replacing Jerry Williams.
The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.
Health and Human Services Secretary Sylvia Burwell appointed a new high-level operations manager to closely supervise the online portal to coverage under President Barack Obama's health care law. She also announced that she's hiring a CEO and a technology leader to specifically handle all aspects of the health law's coverage expansion.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.
It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.
As President Barack Obama proclaims a National Day of Making, the National Institute of Health made 3-D files publicly available online.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
Steven VanRoekel, the federal chief information officer, joined Federal News Radio for a free online chat to discuss the White House's latest IT priorities. View an archived version of the discussion.
As businesses face ever growing data diversity and volume, Enterprise Data Management is moving beyond established EDW and ETL practices toward logical data warehousing strategies that include different mechanisms and tools. In a world where big data has entered into common practice, NoSQL is coming into its own because we are constantly reminded that 80% of our data is unstructured and so a new generation of databases is needed to help deal with it. Why is NoSQL important to organizations/agencies? This panel will discuss ACID Enterprise Compliance, NoSQL vs. Relational Technologies, Enterprise NoSQL addressing security, transactions, availability and scalability.
Today, agencies are expected to maintain a social media presence, not just a website. A new Manager's Guide from the IBM Center for the Business of Government looks at social media efforts across the government and how they support the strategic goals of the administration. Ines Mergel is associate professor of Public Administration at the Maxwell School of Citizenship and Public Affairs at Syracuse University and author of the report. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss what it means to be effective with social media.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
Richard Cheng, principal consultant and training lead for Excella Consulting, will discuss how to apply agile software development at your agency.
June 17, 2014
Federal Chief Information Officer Steve VanRoekel says good management policies should be enough to improve how agencies buy, operate and deliver technology.
As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.