Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Gary Washington, the chief information officer of the Animal and Plant Health Inspection Service, said having a better understanding of its portfolio will ease the transition to new technologies.
August 15, 2013
Army Private Bradley Manning apologizes for giving classified documents to WikiLeaks. His sentencing hearing is raising questions about Army commanders' ability to spot mental health issues.
The director of the Defense Information Systems Agency says the agency will spend the next year focusing on a faster, more agile acquisition process to accelerate the way it delivers technology, rather than letting procurements drag on for years.
The Justice Department's EOIR recently launched its new eRegistry system for attorneys who do work before the immigration courts. The system is one step toward making the office's business processes all electronic. It also will make it harder for notarios, or unqualified people who represent immigrants before the court system, to bilk unsuspecting immigrants.
Todd Sanders, senior partner and Enterprise Data architect at ITOTS Networks, LLC, joins host John Gilroy to discuss a wide range of technology issues.
August 13, 2013
As recently as a decade ago, enterprise services was seen as a way to cut costs and provide more efficient data and telephone services to civilian offices. But now, with the rise of the Pentagon's Joint Information Environment, enterprise services is taking on a new role in providing tactical information advantage to warfighters in the field, and business opportunities to industry capable of providing both the hardware and software to make it happen.
Joining us to talk about it on this edition of "AFCEA Answers" is David DeVries, Deputy Chief Information Officer for Information Enterprise, Department of Defense.
Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without the user's knowledge, when the user merely took a photo that captured a malicious QR code. Lookout was able to force Google Glass to silently connect to a Wi-Fi access point, which let the researchers view all of the data flowing to and from the device. When combined with an Android 4.0.4 web vulnerability, the hack apparently gave researchers full control of the Glass headset.
DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.
The Defense Information Systems Agency will issue several contracts under a unified capabilities initiative to move virtually all of DoD's communications onto Internet Protocol-based networks, and to better integrate voice, video and data services.
The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.
Defense Department's decision to centralize management of mobile technology is borne out of painful lessons from regular old wired IT networks. Budget pressure, officials say, makes it easier to sell the concept of doing things once and sharing the results.
Dave Bennett, the DISA chief information officer, is reducing the number of classified and unclassified networks to reduce costs and improve capabilities. At the same time, he's ready to expand the use of wireless capabilities across Fort Meade, Md.
August 8, 2013
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.
A recent briefing between the House Veterans Affairs Committee, VA IT executives and DHS ended with the lead majority staff member walking out before the meeting ended. The rising tensions between the House Veterans Affairs committee's majority and VA come as a report surfaced showing veterans are at a higher risk of identity theft than the average citizen.
The council is restructuring to match the Obama administration's technology priorities for innovation, governance and cybersecurity. It will now operate with three main committees instead of five.
The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.
Kim Hancher, the chief information officer at the Equal Employment Opportunity Commission, will hsare her ideas on mobile device management
August 6, 2013
Dr. James Green, NASA's director of planetary sciences, told Federal News Radio that Curiosity is uncovering scientific data that one day may lead to humans living on Mars.
The Court of Federal Claims ruled against CenturyLink in its protest of the Interior's Cloud Foundation contract. This was CenturyLink's third unsuccessful protest of the multiple award contract.
Two London men have each been sentenced to two months in jail following contempt of court convictions for misusing the Internet while serving on a jury. One of them posted a Facebook message while the other used Google to search for extra information about the victims of a fraud case and later shared the information with other jurors. A 2010 UK survey by the Guardian found that about 12 percent of jurors involved in high-profile cases had supplemented courtroom evidence with Web searches.