Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The CIO Council will add 25 more examples of IT project management excellence to its best practice database. DHS CIO Richard Spires said at the Excellence.gov awards Tuesday the goal of all of these success stories is to share what worked and leave a broader legacy across all of Federal IT.
Rep. Darrell Issa plans to formally introduce the Federal IT Acquisition Reform Act before the end of March. The House Oversight and Government Reform Committee held its second hearing on the draft bill. Current and former federal officials say the bill should place a stronger emphasis on project management and workforce issues.
APNewsBreak: Homeland Security official retires after illegal immigrants freed over cuts
On this week's edition of Agency of the Month, Rich Serino, deputy administrator of the Federal Emergency Management Agency (FEMA), joins Federal News Radio.
Coast Guard commandant says automatic spending cuts would mean fewer flight hours, sea patrols
This week on Agency of the Month, Angie Salazar, section chief of the Human Smuggling and Trafficking Unit at U.S. Immigration and Customs Enforcement, speaks with Federal News Radio.
The National Treasury Employees Union was informed by Customs and Border Protection that agency-wide furlough notices of up to 14 days will be issued in mid-March as a result of sequestration. CBP told NTEU that it will have to make $754 million in cuts from March 1 through Sept. 30, the end of the current fiscal year.
GAO adds two new areas to the list, NOAA's satellite programs and the federal government's financial risk because of climate change. Comptroller General Gene Dodaro said nearly every initiative on the list made progress in fixing their problems over the last two years.
On this week's episode of Agency of the Month, Dr. Dan Gerstein, deputy under secretary at DHS' Science and Technology Directorate, joins Federal News Radio to discuss how he's working with a drastically smaller budget.
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Sen. Tom Carper (D-Del.) talks about his plans as the new chairman of the Senate Homeland Security and Governmental Affairs Committee. Greg Kutz of TIGTA discusses new progress being made by the IRS in recruitment and hiring. Jennifer Martinez, staff writer at The Hill newspaper, discusses the new Executive Order on cybersecurity. Don Kettl of the University of Maryland's School of Public Policy offers insight on the State of the Union speech.
Senior administration officials say the Executive Order is not a replacement for comprehensive cybersecurity legislation, but the start of a new conversation for how best to protect the nation's critical infrastructure. NIST released an RFI Tuesday as part of its effort to create a voluntary, flexible framework. And DHS will expand the number of companies the government shares classified and unclassified cyber threat information with through the Defense Industrial Base pilot.
Deputy Commissioner David Aguilar says he will be leaving the federal law enforcement agency at the end of March.
Through the Digital Government Strategy, several initiatives are underway to address IT security concerns. DHS created a security baseline architecture and is testing it through five use cases. GSA created a new secure online content platform for agencies to move websites and applications into a mobile environment.
Napolitano says call for border safety before immigration reform is flawed argument
Building on the success of its Global Entry program for pre-enrolled travelers, U.S. Customs and Border Protection has developed a self-service kiosk that anyone can use. John Wagner, executive director for Admissibility and Passenger Programs at CBP, tells Agency of the Month about this and other new technologies coming to an airport near you.
The U.S. Justice Department reports progress in settlement talks over a lawsuit by a House committee to get records involving the bungled gun-tracking program known as Operation Fast and Furious.
An inauguration planning official says turnout was "definitely above 800,000" and possibly up to one million people.
Mike Locatis, the DHS Assistant Secretary for the Office of Cybersecurity and Communications, is returning to Colorado after serving in the federal government for more than two years.
The U.S. Department of Homeland Security is advising people to temporarily disable the Java software on their computers to avoid potential hacking attacks.