Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
OMB and GSA put out separate memos detailing steps agencies should take if the government shuts down. OMB reminded agencies to secure systems and how to deal with third-party social media sites. GSA gave agencies ideas to minimize the impact of having to shutdown websites.
The Homeland Security Department chose 15 large businesses to provide technology development, implementation and maintenance services under the EAGLE II multiple award contract.
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
Al Tarasiuk, the chief information officer of the Office of the Director of National Intelligence, took over the systems integration role for the intelligence community IT Enterprise (ICITE) program after progress slowed.
September 26, 2013
Treasury's Office of Financial Innovation Transformation (OFIT) issued a draft set of requirements that agencies must meet if they want to be federal shared services providers. The requirements should be finalized this fall, and a new set of providers will be in place in the coming months.
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
How does Tripwire help Federal Agencies with their continuous monitoring plans? Hear from Dwayne Melanšon, Chief Technology Officer at Tripwire!
Federal News Radio's Tom Temin shares what's been bugging him lately about the federal mobility strategy.
Tactical radios are evolving from devices that merely transmit voice messages from one point to another, into devices that allow warfighters to receive important multimedia information at the edge of the tactical network. But what are the challenges, opportunities - and frustrations - of avoiding past mistakes, and realizing the promise of joint tactical communications devices? We'll explore that on this edition of AFCEA Answers with the Marines CIO, Gen. Kevin Nally USMC, and retired Army General Dennis Moran, Vice President of Government Business Development with Harris RF Communications.
BlackBerry to lay off 4,500 or 40 percent of global workforce; posts nearly $1B 2Q loss
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Cheryl Cook, the Agriculture Department's chief information officer, said she's focusing on governance to improve mobile computing and reduce duplication among IT programs.
On this week's Capital Impact show, Bloomberg Government analysts examine the latest round of exhibit 300's for cloud computing opportunities, and give us an update on efforts to increase production of clean renewable fuels in the U.S.
September 19, 2013
How are agencies tackling the threats and vulnerabilities inherent in today's technology dependent government?
Continuous monitoring provides nearly real-time information in the face of cyber attacks and is essential for senior leaders making ongoing risk-based decisions that affect critical mission and business functions. OMB mandates and NIST guidelines require agencies to establish oversight mechanisms to evaluate systematically and ensure the continuing security, interoperability, and availability of systems and agency data. Tune into this interactive discussion to learn about the current state of risk management and how agencies are using continuous monitoring to maintain situational awareness of information security and organizational risk.
Senior uniformed Air Force leaders have agreed it's time to give more authority to the service's chief information officer. The CIO is drafting plans that will give it more say-so over planning the overall IT environment and the dollars targeted toward individual projects.
Jim Williams and Rick Holgate from ACT-IAC will fill us in on next month's 2013 Executive Leadership Conference in Williamsburg Virginia.
September 17, 2013
INSIDE THE REPORTER'S NOTEBOOK: FEMA to name Gardner as CIO; new DHS CIO close; NASA struggles with HSPD-12
News and buzz in the acquisition and IT communities that you may have missed this week.
The General Services Administration will focus on its core mission and let others provide payroll and human resources services. The decision comes as shared services is gaining momentum as OPM is pumping some energy back into the HR line of business, and the Interior will release a new geospatial platform to host data and applications.
After three years and multiple protests, the contract for the second generation e-travel system finally is decided. GSA awards CWTSato to compete with Concur Technologies to provide a travel management system to agencies.