Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.
Counter-terrorism is a key tenet of President Barack Obama's foreign policy plan going forward. He said in a speech at West Point on Wednesday, "the most direct threat to America at home and abroad remains terrorism. But a strategy that involves invading every country that harbors terrorist networks is na´ve and unsustainable." His plan is to advise and assist countries facing significant terrorism threats and help build the capacity to deal with threats on their own.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
Congress is hollowing out the Defense Department and turning the nation's military into a paper tiger of global proportions. That's according to Bryan Clark, a senior fellow at the Center for Strategic and Budgetary Assessments and a former special assistant to the Chief of Naval Operations. He joined In Depth with Francis Rose for Pentagon Solutions today. He and his colleague Todd Harrison write about the Defense Department's fiscal 2015 budget process on Capitol Hill and how it forces the Pentagon to ignore its own budgetary wisdom.
Officials: Army relieves hospital chief of command; Hagel orders military health system review
The leadership displayed by his fellow prisoners at the Hanoi Hilton prison camp inspired the leadership lessons Lee Ellis teaches as part of his job as a leadership consultant.
President Barack Obama has announced that 9800 troops will be left behind next year when all combat troops pull out of Afghanistan. Secretary of Defense Chuck Hagel said in a statement, "I strongly support the president's decision to maintain a limited U.S. troop presence in Afghanistan after our combat mission ends there later this year." Hagel said the move will do two things: "it will help ensure that al-Qaida cannot reconstitute itself in Afghanistan, and it will help us sustain the significant progress we have made in training and equipping the Afghan national security forces."
The Professional Services Council has launched a new initiative to focus on technology policy. It's picked a defense insider to lead it. Dave Wennergren served in the Defense Department until 2013 when he joined the contractor CACI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the latest chapter in his career.
Judging from the Defense authorization bills that have passed the House and been marked up in the Senate, Congress seems to have made a hash out of Pentagon plans to meet its budgetary goals. Todd Harrison is a senior fellow at the Center for Strategic and Budgetary Assessments. He joined Tom Temin and Emily Kopp on the Federal Drive to help sort out the reality of where Defense spending is headed and who will benefit.
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
AP Exclusive: Bungled nuke silo security drill prompted more training for nightmare scenarios
Defense Secretary Chuck Hagel addressed Naval Academy graduates last week during their commencement ceremonies and he gave them three pieces of advice. One, "connect with people on a personal level", two, "try to understand perspectives that are different from yours" and three, "be humble". He also cautioned them about pressure saying, "Once you take up your duty stations and the responsibility of leadership, you will find yourselves under tremendous pressures you've never experienced."
When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.
The House passed its version of the annual defense authorization bill Thursday, while the Senate's is still a work in progress. Both versions mostly shun DoD's proposals to cut costs during sequestration.
According to an internal Air Force review obtained by The Associated Press, armed security forces at a nuclear missile base failed a drill last summer that simulated the hostile takeover of a missile launch silo because they were unable to speedily regain control of the captured nuclear weapon. The AP's Robert Burns writes, "the previously unreported failure, which the Air Force called a `critical deficiency,' was the reason the 341st Missile Wing at Malmstrom Air Force Base in Montana flunked its broader safety and security inspection."
The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.
Appointment is a promotion for Dave Tillotson, who until now has served as the Air Force's deputy chief management officer.
The Missile Defense Agency, the U.S. Navy, and sailors at the Aegis Ashore Missile Defense Test Complex and Pacific Missile Range Facility (PMRF) successfully conducted the first flight test involving components of the Aegis Ashore system. During the test, a simulated ballistic missile target was acquired, tracked, and engaged by the Aegis Weapon System. The primary purpose of the test was to confirm the functionality of Aegis Ashore by launching a land-based SM-3.
A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.
The Pentagon says Russia is not withdrawing its troops from the Ukraine border, despite Moscow's claim that the order to pull out has been given. Rear Adm. John Kirby says small numbers of Russian troops have gone back and forth to forward operating bases near the border, but the U.S. has seen no movement of Russian troops back to their home bases. NATO says Russia has 40,000 troops along the border.