Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S. Cyber Command.
Faced with declining resources, the Internal Revenue Service has diverted resources from elsewhere inside the agency to try and head off skyrocketing cases of identity theft stemming from tax refunds.
A charity event next week raises funds for military members. Plus, the do's and don'ts of holiday giving (and receiving) at the workplace.
Randy Williamson, director of health care Issues at GAO, talks about the progress being made at Walter Reed Medical Center. Blogger Tom Cochran shares trivia about some government buildings in Washington, D.C. Dr. Jacques Gansler discusses a new master's degree program focusing on federal acquisition and contracting. Jeff Neal of ICF International discusses the results of the 2012 Employee Viewpoint Survey. Christi Grimm of the Inspector General's Office talks about mispayments by the Centers for Medicare and Medicaid Services. Daniel Schuman of the Sunlight Foundation discusses open data from the federal government.
President Barack Obama has issued new agency standards for protecting classified information from insider threats. In a Presidential Memorandum issued Wednesday, Obama provided the heads of executive branch departments and agencies the new National Insider Threat Policy as well as the minimum standards to be employed by each agency in standing up its own insider-threat programs. Details on the new policy and the standards were not made public.
Rep. Gerry Connolly (D-Va.) discusses what progress Congress can realistically make on the budget. Anthony Amendolia of the DLA talks turkey -- as in, the thousands of turkeys he ordered for service members overseas. Alex Bolton, senior writer for The Hill, discusses Congress' strategies to avoid the fiscal cliff. GAO's Steve Lord reviews TSA's complaint process.
Tom Sisti, director and legislative counsel for SAP, joins host Roger Waldron to talk about a wide range of acquisition issues.
November 20, 2012
A New York judge has refused to grant bail to a Chicago man charged in a conspiracy to hack into corporations and government agencies worldwide.
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
Export-Import Bank President Fred Hochberg explains why his agency had a banner year, with a record number of transactions in fiscal 2012. And a professor at the Wharton School describes how private insurance companies are making money off the National Flood Insurance Program — but taxpayers are likely to pick up the slack when claims surpass premiums.
The Republican leader said today on the Senate floor that after the debates over the DoD and Intelligence authorization bills, lawmakers could address concerns about the Cybersecurity Act of 2012.
The upper chamber fails to move cyber bill out of starting blocks by receiving 60 votes to end cloture. Lawmakers couldn't get past their concerns over the requirement for regulations and DHS' oversight role.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Po Collins of the National Contract Management Association talks ethics. Don Kettl, dean of the school of Public Policy, University of Maryland, sheds light on the election. Craig Karch of ICE talks about the return of antiquities to Mexico. Alexander Bolton of The Hill newspaper and J.David Cox, national president of AFGE, call in about the election.
The Consortium for Cybersecurity Action, a newly-formed international group of government agencies and private organizations from around the world, today will release an updated baseline of the 20 most important cyber controls. The group wants to become a resource to help agencies implement those security checks. DHS already is developing a solicitation to make it easier for agencies to buy tools and services to implement several of the security checks.
Justice IG Michael Horowitz shares findings about what happens to illegal immigrants before they go to immigration court. Plus, how are postal employees faring on the East Coast after superstorm Sandy?
Thousands of IRS computers could be prone to cyber intruders because officials aren't updating software in a timely manner, according to a report from the Treasury Inspector General for Tax Administration.
Terry Edwards, the director of the Office of the Chief Systems Engineer and chief information officer for the assistant secretary for acquisition, logistics and technology, said his office helps acquire technology and ensure standards are met.
November 1, 2012(Encore presentation December 27, 2012)
EPA's 25,000 email users will be fully migrated to the cloud by early 2013 thanks to collaboration solutions provided by Lockheed Martin and Microsoft.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.