Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The Justice Department has rewritten the playbook on catching cyber criminals. It recently led an international effort to disrupt a global cybertheft ring. A Russian-led gang allegedly stole millions of dollars by infecting computers with malware known as Gameover Zeus. Robert Anderson is the executive assistant director of the Criminal, Cyber Response and Services Branch at the FBI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the sting operation worked.
Jill Singer, partner at Deep Water Point and former CIO of the National Reconnaissance Office, sits down with Women of Washington radio show hosts Aileen Black and Gigi Schumm, for a discussion about cloud computing and insider threats.
The Continuous Diagnostics and Mitigation (CDM) program was created to provide agencies visibility into their networks to identify any cyber flaws and remediate them in a swift and streamlined approach. Though many agencies have already implemented a number of security tools, they still may lack a method for aggregating and analyzing the collective data for a holistic picture of their security posture. The CDM initiative is aimed at getting all civilian agencies the proper tools to improve vulnerability management, manage hardware and software assets, and ensure the proper security configurations are in place.
The Defense Intelligence Agency will inaugurate its new Open Innovation Gateway on Wednesday, as part of its strategy to bring new technologies into the intelligence community from non-traditional vendors, and to buy new capabilities within weeks instead of years.
Scott Gaydos, chief technologist, Federal Healthcare, U.S. Public Sector, HP Enterprise Services, discusses how his company can help your agency with its cloud initiatives.
June 24, 2014
The Senate Homeland Security and Governmental Affairs Committee members will introduce and markup the Federal Information Security Modernization Act of 2014 Wednesday. The bill would require OMB to rescind a major section of Circular A-130 in order to fix long-standing complaints with FISMA's reauthorization requirements.
Is your agency getting as much value out of its social media efforts as it could be? A new report offers tips for agencies looking to take advantage of the data that can be mined from Twitter, Facebook and other social media outlets.
Senate legislators will introduce and markup its version of the Federal IT Acquisition Reform Act (FITARA) Wednesday, with a focus on giving CIOs full IT budget and contracting authority. The House and Senate bills differ in several ways, including how to limit the title CIO.
The new Health and Human Services Secretary is revamping management of HealthCare.gov. Sylvia Burwell has appointed a new operations manager to closely supervise the website, and she plans to fill more management positions. The goal is to make sure this year's open season doesn't mirror the fiasco of when HealthCare.gov first opened for business last year. Elise Viebeck covers health care issues for The Hill Newspaper. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new moves.
Rafael Diaz is named as the new HUD chief information officer, replacing Jerry Williams.
The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.
Health and Human Services Secretary Sylvia Burwell appointed a new high-level operations manager to closely supervise the online portal to coverage under President Barack Obama's health care law. She also announced that she's hiring a CEO and a technology leader to specifically handle all aspects of the health law's coverage expansion.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.
It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.
As President Barack Obama proclaims a National Day of Making, the National Institute of Health made 3-D files publicly available online.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
Steven VanRoekel, the federal chief information officer, joined Federal News Radio for a free online chat to discuss the White House's latest IT priorities. View an archived version of the discussion.
As businesses face ever growing data diversity and volume, Enterprise Data Management is moving beyond established EDW and ETL practices toward logical data warehousing strategies that include different mechanisms and tools. In a world where big data has entered into common practice, NoSQL is coming into its own because we are constantly reminded that 80% of our data is unstructured and so a new generation of databases is needed to help deal with it. Why is NoSQL important to organizations/agencies? This panel will discuss ACID Enterprise Compliance, NoSQL vs. Relational Technologies, Enterprise NoSQL addressing security, transactions, availability and scalability.
Today, agencies are expected to maintain a social media presence, not just a website. A new Manager's Guide from the IBM Center for the Business of Government looks at social media efforts across the government and how they support the strategic goals of the administration. Ines Mergel is associate professor of Public Administration at the Maxwell School of Citizenship and Public Affairs at Syracuse University and author of the report. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss what it means to be effective with social media.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.