Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
EEOC CIO Kimberly Hancher and Mike Cerniglia from MicroPact discuss how cloud computing, and open sourcing reduced her agency's IT costs.
June 10, 2014
It keeps getting easier to manufacture a counterfeit computer chip. Experts say federal information systems increasingly are at risk because of flaws in their supply chains. It is not just a question of fake parts. Genuine ones that have been tampered with, or are just poorly made, can cause damage. The National Institute of Standards and Technology is revising guidelines for agencies to help them secure their supply chains. Jon Boyens is an IT specialist in the security outreach and integration group at NIST. He spoke with Emily Kopp on the Federal Drive.
Listen Tuesday June 10th @ 12pm
Inside the Reporter's Notebook: FedRAMP compliance results months away, OMB's word of the year: Effectiveness
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Rick Holgate, the chief information officer and assistant director for science and technology at the Bureau of Alcohol, Tobacco, Firearms and Explosives, said lighter, more mobile computers along with VDI and the cloud is making it easier for employees to do their jobs.
The Data Aggregation Working Group, or DAWG, will deliver both plans and tools later this year to change the way agencies review and share terrorism information. DAWG members hope the reference architecture, as the plan is called, will give law enforcement and intelligence community agencies a new path toward understanding the full threat picture. Dirk Rankin is the chief technology officer for the National Counterterrorism Center and the co-chairman of the Data Aggregation Working Group. Paul Reynolds is the other co-chairman. In part two of their interview, they tell executive editor Jason Miller about the DAWG's role in creating a secure information sharing environment. Read Jason's related article.
Federal chief information officers have adjusted to flat technology budgets. But they haven't quite been able to shift significant money to modernization and innovation and away from operations. Federal News Radio's executive editor Jason Miller joined Tom Temin on the Federal Drive to discuss what CIOs say are their biggest challenges and concerns in a new TechAmerica and Grant Thornton survey. Read Jason's related article.
The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.
A new survey by TechAmerica and Grant Thornton found many agency chief information officers continue to spend too much on legacy systems and don't have money to develop or modernize new software or applications. But tools such as PortfolioStat are making a difference in helping senior IT managers understand and have a say in where money is spent in their agency.
Defense health officials are testing a tool to give service members a mental health boost on demand. It's a mobile app called the Virtual Hope Box. Each user can customize it. Mark Reger is the deputy director and chief of research at the National Center for Telehealth and Technology, which is part of the Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury. He explained the app's purpose when he joined Tom Temin and Emily Kopp on the Federal Drive.
The Data Aggregation Working Group, under the Information Sharing Environment, is creating a data aggregation reference architecture to give law enforcement and intelligence agencies a better approach to sharing information more securely and more quickly. The group ran two pilots and created a tool kit for others to use.
Chris Hornbecker, CEO of Xgility, will discuss how SharePoint can help your agency with collaboration.
June 3, 2014
The Food and Drug Administration has launched openFDA. It's a new data initiative making for easier access to large public health datasets. OpenFDA is in line with the President's open data executive order and the Health and Human Service Department's Health Data Initiative. Taha Kass-Hout is chief health informatics officer at the FDA. He explains the main focus of the project to Tom and Emily on the Federal Drive.
A computer hacker facing up to 20 years in prison is free after helping the federal government stop hundreds of cyberattacks. He taught agencies how to protect millions of dollars and cripple the hacker group Anonymous. Retired Air Force Maj. Gen. Dale Meyerrose was chief information officer for three Air Force commands and three joint combatant commands. He was also the first CIO of the Office of the Director of National Intelligence and is now president of the Meyerrose Group. He joined In Depth with Francis Rose to explain what kind of precedence this sets for future cybersecurity policies.
The Department of Homeland Security is focused on the growing cybersecurity threat. Damage from cyber-attacks is not limited to denial of services. It can involve significant financial losses, theft of intellectual property, impact our national security, and can destroy key parts of the critical infrastructure that citizens depend on for their day to day lives.
Maryland has declared itself the epicenter of cybersecurity. At least Sen. Barbara Mikulski (D-Md.) has. She helped establish the Maryland Cybersecurity Roundtable. That move was recommended by the Federal Facilities Advisory Board last year. Tom and Emily spoke with Len Moodispaw on the Federal Drive. He's CEO of KEYW Corporation and President of the newly-formed Maryland Cybersecurity Roundtable.
You may think you've heard enough advice on cloud computing. But there's always something new to learn. That's the idea behind the just-published Cloud Buyer's Guide for Government. It was produced by the Tech America Foundation. Tom and Emily spoke with Mike Hettinger of TechAmerica on the Federal Drive about this update in cloud computing.
The White House is looking for new ways to stay ahead of the technology curve. One consideration is to upgrade its smart phones from blackberries to Androids or other smartphones. But making the switch is not that easy. There are things to consider such as security issues, effectiveness, and cost. For perspective, Tom and Emily spoke with Shawn McCarthy research director at IDC Government on the Federal Drive. He explains why the White House is not switching from using the blackberry in the near future.
Inside the DoD Reporter's Notebook: DoD drills down on service contracting; a controversial decision on contractor pay
"Inside the DoD's Reporter's Notebook" is a bi-weekly feature focused on news about the Defense Department and defense community as gathered by Federal News Radio DoD Reporter Jared Serbu. Submit your ideas, suggestions and news tips to Jared via email.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.