Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Several departments are out ahead of the OMB mandate to consolidate data facilities over the next four years. Energy is starting small to show business owners they will get the same level of service under the new setup. Other agencies see green in cutting back on the centers-both money and energy efficiency.
A preview of Federal Security Spotlight with HHS' Tom Shankweiler.
The collaborative tool is an example of how agencies can share information securely. Chris Bronk, a fellow for information technology policy at the James Baker Institute for Public Policy at Rice University, explains how Diplopedia works.
Agency's policy head discusses the first-ever four-year review of the Department's operations, future budgets.
The lawyer who represented the New York Times in the Pentagon Papers case writes about the differences between the two document leaks.
The Washington Post reports on the vast amount of data contained in Net-Centric, whether it belonged there or not.
The New York Times reports on U.S. diplomats' efforts to market U.S. items, such as jets, to foreign countries, revealed by the WikiLeaks cables.
With the report now completed, what changes are in store for the nation's development and diplomacy missions? Jon Allen and Cheryl Steele, senior associates at Booz Allen Hamilton share their insights
The company will provide engineering, security and operations and maintenance services under the Vanguard program. The 10-year contract is one piece of a larger IT consolidation effort State is in the middle of completing.
The State Department's Office of the Coordinator for Cyber Issues will focus on cybersecurity.
Secretary of State Hillary Rodham Clinton on Wednesday unveiled a reorganization plan for the State Department that include a new coordinator for cyber security.
The New York Times and the Economist report on the U.S. government's ability to keep a secret after the WikiLeaks dumps of classified information.
Lawmakers have urged President Obama to expand the State Department's cyber authority.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that the WikiLeaks cable reveal locations that are of national security interest.
One of the top IT officials at the State Department wants to push the boundaries of using biometrics to determine who gets visas and passports in the United States.
Lovisa Williams writes in her blog that Gov 2.0 is not in a slump but in metamorphosis.
Josh Goldstein, co-coordinator of the Apps 4 Africa contest, joined the DorobekINSIDER to describe how the contest taps into local talent and the widespread use of mobile devices to help solve the communities' social and economic problems.
Adam Conner, the Washington DC associate manager for privacy and global public policy at Facebook, participated in the State Department's Panel on Social Media and Cybersecurity. He said State has done a great job of creating social media experts.
Lovisa Williams, the deputy director for State's International Information Programs Bureau of Innovative Engagement, said her office spends about 50 percent of their time educating feds on the risks of social networking tools.