Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
How is the State Department using technology to build bridges?
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.
Posing as someone else and using fake birth certificates and driver's licenses to get a U.S. passport can still work. For the second time in two years, the GAO has found holes in the country's security by deliberately using fraudulent material to obtain passports. But the hole has gotten smaller. GAO's Greg Kutz joins us with details.
A Senate panel probes the government's continued foreign language deficiencies. The Government Accountability Office finds limited progress across several agencies. DHS and DoD are taking steps to increase the number of employees with foreign language skills.
GAO found significant success in obtaining passports using fraudulent documents in the second investigation in two years. While State is implementing facial recognition technology to close the existing gaps, lawmakers are introducing new legislation to give the agency more security capabilities.
WFED's Jason Miller reports.
At the Excellence of Government Conference, the State Department's Richard Boly, director of the Office of e-Diplomacy, talks about ways to improve communication and transparency without adding cost or red-tape.
If outsourcing is the answer, what should be the question? We hear from Commissioner Grant Green of the Commission on Wartime Contracting in Iraq and Afghanistan.
State Department believes an alleged whistle-blower obtained secret diplomatic data.
As the U.S. military pulls troops and equipment out of Iraq, the State Department will have to rely increasingly on contractors.
Get the details on what they can and can't do.
A new State department partnership will reach out to Muslim communities with education, employment, skills training and economic development aid
Fourteen years ago, Congress passed the landmark Clinger-Cohen Act, creating the job of chief information officer in federal agencies. How has the job changed over the years, and what do today's CIOs think of their role?
The awards are designed to encourage Foreign Service officers to speak out.
The agency, which began their eDiplomacy taskforce in 2002, wants to be able to connect their diplomats around the world. And they're using the power of the Internet to do it.
This week, host John Gilroy talks to Richard Boly, the force behind the State Department's Diplopedia.
June 22, 2010
The Senate has rejected an attempt to freeze federal pay and the size of the government workforce. Also included in the defeated proposal was funding for a planned State Department security training facility.
In spite of the billions of dollars the U.S. government has provided Iraq to train it's military forces, there is evidence still of deep concern about whether they can do it. The State Department is reportedly putting together a diplomatic protection force to take the place of the U.S. military once they leave the country next year. Department officials are asking the Pentagon to provide heavy military gear, including Black Hawk helicopters, and say they will also need substantial support from private contractors.
Earth Day Network and the U.S. Department of State have developed the D.C. Forum for Greening Embassies so that foreign missions can exchange ideas on environmental issues and operational practices. Details from State Department's director of management policy, right sizing and innovation, Marguerite Coffey.
Diplomats need to work with the under-30 age group that is using Internet-based communication technology, State's Jared Cohen says.