Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Lovisa Williams, the deputy director for State's International Information Programs Bureau of Innovative Engagement, said her office spends about 50 percent of their time educating feds on the risks of social networking tools.
Secretary of State Hillary Clinton encourages innovators to use technology to help the world's most pressing problems. The idea is already in practice with the Apps 4 Africa contest, which State helps fund.
Alec Ross is the Senior Advisor for Innovation in the Office of Secretary of State Hillary Clinton said 21st century statecraft already has provided some short-term successes.
Agriculture plans to update its second version of its green IT strategy this year. State is implementing power management tools and could save almost $2 million. Both agencies are making headway to change the culture of how IT is used by their respective employees.
Hear more from Homeland Security Editor David Silverberg
Congressmen Skelton and Davis say legislation would apply the lessons learned from Goldwater-Nichols Act to more than 13 agencies to help promote collaboration and understanding of each other's roles. The bill calls for a two-year detail for each senior official to learn how other national security agencies work.
A congressionally chartered commission said the State Department does not have the training or expertise to take over security operation in Iraq when the military departs at the end of 2011.
Senators praise Lew for experience. Committee plans to vote on his nomination next week. Lew said technology, acquisition reform and performance management are among his top non-budget priorities.
The Center for a New American Security (CNAS) released three publications today that offer policy recommendations for the QDDR team.
E-Mentees will be recruited through State's existing network of thousands of alumni from exchange programs focusing on entrepreneurship, and others who express serious interest in entrepreneurial guidance. We get details from the State Department's Steven Koltai.
A small army of American diplomats left behind is embarking on a long and perilous path to keeping Iraq from slipping back to the brink of civil war. Michael Corbin is the Deputy Assistant Secretary of State in the Bureau of Near Eastern Affairs for Iraq issues explains the road ahead.
Read more from the blog TechChange.
Move over Facebook and Twitter, there's a new social media competitor making its way through the federal government.
Secretary of State Hillary Clinton made the announcement in a video.
For the first time in 15 years, U.S. officials have lost their ability to inspect Russian long-range nuclear bases.
State plans to expand role, but might not have the budget.
As a deputy legal adviser, Robert Harris supervises offices providing advice on an array of issues ranging from human rights and refugees, treaties, law enforcement and intelligence, and regional issues involving the Western Hemisphere and Asia.
How is the State Department using technology to build bridges?
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.
Posing as someone else and using fake birth certificates and driver's licenses to get a U.S. passport can still work. For the second time in two years, the GAO has found holes in the country's security by deliberately using fraudulent material to obtain passports. But the hole has gotten smaller. GAO's Greg Kutz joins us with details.