Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The government is working with a cobbled-together set of authorities and responsibilities when it comes to protecting networks from cyber threats, a top Homeland Security Department cyber official said Wednesday. Congress needs to act soon to update the nation's cybersecurity posture, he said.
ThunderCat Technology founder Tom Deierlien joins host John Gilroy to talk about how his company can help your agency with its data center consolidation.
May 1, 2012
CIO Del Brockett said he's taking a two-pronged approach to provide better service to employees and the public. He said innovation through pilots with the labs show the value of emerging technologies.
April 26, 2012
The House-passed DATA Act creates a five-member commission to oversee government transparency.
The House is expected to vote on — and pass — the bipartisan Digital Accountability and Transparency Act, which aims to save taxpayer money by tracking spending by federal agencies.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.
Host John Gilroy will talk federal IT issues with former White House Chief Information Officer Aneesh Chopra.
April 24, 2012
Shared IT services include virtualized services, cloud computing, object reuse, security controls and continuous monitoring, Klimavicz writes in a blog post.
The RAT Board is a model for government-wide spending oversight, and bipartisan legislation in both the House and Senate could make the RAT Board a permanent fixture in overseeing federal spending.
Niall Brennan, director for Policy and the Data Analytics Group at the Centers for Medicare and Medicaid Services will talk about how to process large volumes of data.
April 17, 2012
Sunlight Foundation Policy Counsel Daniel Schuman is leading the campaign to improve the Library of Congress website that reports congressional data.
The White House launched a new "Do Not Pay" tool on Thursday to prevent improper payments to individuals and companies. Agency heads must submit plans to adopt the tool by June 30.
Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.) introduced legislation to make sharing of classified cyber threat information easier between the government and the private sector. The bill builds on DoD's Defense Industrial Base pilot to share data about vulnerabilities. DoD plans to expand the DIB pilot to more than 200 companies in the coming year.
Appian Chief Technology Officer Mike Beckley talks about the business strategies that have helped his company grow.
April 10, 2012
Karen Guice, the acting CIO for the Military
Health System, said her office is working the
Veterans Affairs Department to ensure the
transition to the new electronic health record
from legacy systems is as seamless as possible.
She said DoD and VA are working on a data
April 5, 2012(Encore presentation June 14, 2012)
Several advocacy groups have raised major civil-liberties concerns about pending cybersecurity legislation, claiming the language may unfairly expose personal information and punish those who hide it.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Latisys CEO Peter Stevenson explains how his company can help your agency or business move to the cloud.
April 3, 2012
Center CIO Mike Bolger said encrypting laptops and implementing logical access are among his top priorities in 2012. Kennedy Space Center also is exploring how to let employees using their personal smartphones or tablet computers on the network.
March 29, 2012
Former Federal Chief Information Officer Vivek Kundra will talk about what he's doing now, and some of the things he accomplished as CIO.
March 27, 2012