Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Many agencies are now allowing employees to use their own smartphone devices. But the results of a survey by the National Cyber Security Alliance and McAfee found almost three-quarters of Americans do not have any security software or data protection applications installed on their smartphones.
George Jakabcin, the agency's CIO, said every employee will get a new laptop and be able to access the network through a WiFi VPN connection. More than 80 percent of all employees work outside the office at least one day a week.
January 5, 2012(Encore presentation March 1, 2012)
The Defense Information Systems Agency has granted approval for Android-based mobile devices to connect to DoD networks, provided they're secured using a specific set of guidelines
Federal News Radio's Jason Miller offers his top stories of 2011 and predictions for 2012.
Chris Wysopal, the co-founder and chief technology officer of Veracode, joined In Depth with Francis Rose to discuss a recent Veracode report examining the federal government's security posture for its mobile applications. The report found agency apps are often at higher risk of certain attacks.
The bureau has said, because the investigation into the company's possible wrongdoings is ongoing it will not publish information on company. The company, which provides mobile-analytics software, faces a lawsuit alleging it violated federal wiretap laws because its services are intrusive and infringe on users privacy.
Attackers uploaded malware-laden copies of popular apps, such as Angry Birds. While Google removed the apps from its online store, more than 14,000 users downloaded them.
Dan Saaty of Decision Lens joins host John Gilroy to discuss how prioritization software can help your agency.
December 13, 2011(Encore presentation December 27, 2011)
The high-profile issues of mobility and cloud computing are interconnected and reflect a shifting landscape not only at federal agencies but on a much wider scale, said EmeSec founder and CEO Maria Horton in an interview on Industry Chatter with Francis Rose.
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.
The bureau hired Agilex under a four-year, $6.4 million contract to provide application development and technical support for field workers to use tablet computers. Census field workers will receive one of three different tablets for conducting actual surveys for the bureau and other federal agencies.
Eight companies are headed to court over their use of Carrier IQ software, Computerworld reports. The lawsuit says the companies have violated federal wiretap laws because Carrier IQ's services, which provides analytics, are intrusive and infringe on users' privacy.
Phil Cirrulli, the chief information officer for the managing and operations contractor for the site, is improving the national lab's infrastructure to support widespread wireless access. He also is shutting down legacy mainframe systems after implementing a new ERP system.
December 1, 2011
Agency technology managers looking to implement a "bring-your-own-device" mobile strategy, should expect a culture shift along with the technological update said Rex Greer, the president of OVATION Wireless Management, and Richard Russell, the deputy of the Senior National Intelligence Service in an interview on In Depth with Francis Rose.
Bradley Anstis is the vice president of technical strategy at M86 Security, joined In Depth with Francis Rose to discuss the network threats, why the Android platform is an increasing target and what agencies can do protect themselves.
Host John Gilroy is joined by AirPatrol Corporation CTO Tom Kellermann. They will discuss how to control data leakage from mobile devices.
November 22, 2011
The Android operating system developed by Google is expected to win approval for use on military networks by April.
Host John Gilroy will talk cloud computing, health IT, and mobile technology with Tracey Graves-Stevens, President and CEO of Innoviss.
November 15, 2011
Jen Modarelli, CEO and principal of White Horse, has been studying federal government apps and joins In Depth with tips to make the most of mobile apps.
GPO's Chief Technology Officer Ric Davis talks about launching the agency's first mobile app. Users will be able to access information about members of Congress on their mobile devices.