Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Guident Executive Vice President Dan Ackerman and Senior Vice President Ken Raffel join host John Gilroy to talk about how business intelligence is changing.
January 24, 2012
The Census Bureau has moved a large cache of files from its AmericanFactFinder system into a new setup.
The Department of Veterans Affairs is offering free credit monitoring for one year to more than 2,200 veterans after the agency mistakenly released personal information of those vets online.
The University of Maryland's CIO Certificate program focuses on teaching its students to meet the challenges of management and leadership. The certificate program is one of several affiliated with GSA's CIO University.
January 19, 2012
Host John Gilroy will talk cloud computing with David Blankenhorn, the chief cloud technologist at DLT Solutions.
January 17, 2012
Kay Sears, president of Intelsat General Corporation, will talk about how the federal communications marketplace is changing.
January 17, 2012
Carnegie Mellon University's CIO Institute helps train the next generation of senior technology managers.
January 12, 2012
Host John Gilroy will talk cloud computing with Tony Bardo, assitant vice president for Government Solutions at Hughes.
January 10, 2012
Request for information covers maintenance of all joint staff networks and applications, and ensuring the network is secure through risk management mitigation, network vulnerability analysis and security auditing.
Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012
Jerry Ellig, a senior research fellow at the Mercatus Center at George Mason University, spoke to The Federal Drive with Tom Temin about some of the roadblocks federal employees face in implementing new regulations.
The hacker group Anonymous claims it hacked into state government systems by stealing and reusing the passwords officers used to access their personal email accounts.
Great Britain is considering developing an app that would provide real-time updates of government information and statistics.
The Federal Communications Commission launched a website this month that allows users to create a personalized dashboard to more easily access information.
Federal Agencies submitted their 2011 FOIA reports earlier this month, and all that information goes up on your agency's website and at FOIA.gov by Feb. 1.
John Wonderlich of the Sunlight Foundation talks about his organization's review of the Open Government Directive. How well have agencies complied with mandate?
Dan Saaty of Decision Lens joins host John Gilroy to discuss how prioritization software can help your agency.
December 13, 2011(Encore presentation December 27, 2011)
The DoD Cyber Command poked and prodded the Army Corps' Los Angeles district's network during a recent Command Cyber Readiness Inspection. Army Corps of Engineers CIO Bob Kazimer said the analysis will give the rest of the agency lessons learned to improve cybersecurity across the Corps.
December 15, 2011
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.