Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The White House is looking for new ways to stay ahead of the technology curve. One consideration is to upgrade its smart phones from blackberries to Androids or other smartphones. But making the switch is not that easy. There are things to consider such as security issues, effectiveness, and cost. For perspective, Tom and Emily spoke with Shawn McCarthy research director at IDC Government on the Federal Drive. He explains why the White House is not switching from using the blackberry in the near future.
Inside the DoD Reporter's Notebook: DoD drills down on service contracting; a controversial decision on contractor pay
"Inside the DoD's Reporter's Notebook" is a bi-weekly feature focused on news about the Defense Department and defense community as gathered by Federal News Radio DoD Reporter Jared Serbu. Submit your ideas, suggestions and news tips to Jared via email.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.
The 2013 FISMA report to Congress shows the Veterans Affairs Department continues to struggle with cybersecurity and has more than 6,000 items on its plans of actions and milestones and continued weaknesses in access and configuration management controls. VA CIO Stephen Warren details several initiatives to address many of the 35 recommendations.
Jonathan Baker, deputy chief engineer of the Delta IV Launch System at the Air Force Space and Missile Center Launch Systems Directorate in El Segundo, California, helped save the Air Force billions of dollars and a lot of stress on its satellite launches.
Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.
Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
You are the key to stopping an insider threat and preventing a cyber incident at your agency even if you don't work in the IT department. Richard Stiennon is the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. He says there are two categories of insider threats and identifying the most dangerous kind depends on you.
May 29, 2014:Today, Jason Miller, WTOP and Doug Bourgeois, VMware, and Stuart Fleagle, Carpathia discuss the case for Hybrid Cloud. Major transformation is underway that affects how we live and work. This transformation is enabled by technological innovation, particularly by Cloud Computing and the Mobile Internet. For Federal IT organizations to successfully deliver this Transformation, they need to fully embrace their existing investments to leverage a hybrid cloud. A carefully architected hybrid cloud approach that leverages previous private cloud investments will help drive compatibility across a multi-cloud environment, and minimize the ‘silos of clouds' that are popping up today. Listen in to the discussion, and see what they have to say about the intersection of technology and transformation.
Allison Hickey, VA's undersecretary for benefits, said VBMS has transformed the agency from a paper system to one that mostly relies on electronic data. Some lawmakers express concern about the way the agency is measuring how it reduces the number of veterans waiting for benefits.
Mike Olson, board chairman and chief strategy officer of Cloudera, will talk about some of the tools your agency can use to manage its stored data.
May 27, 2014
Listen Tuesday May 27th @ 12pm
In a repeat performance from last year, the House has included a major IT procurement reform plan as part of the 2015 Defense Authorization bill. Last year it got removed in conference. But this year a similar bill is rattling around the Senate. Plus, there have been some changes in the content of the House version. Trey Hodgkins is senior vice president for the public sector at the Information Technology Industry Council. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the significant changes made in this year's version of FITARA.
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
May 23, 2014
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.
Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.
The General Services Administration received responses Thursday from vendors on how to shape the first major acquisition under the Network Services 2020 program. Officials say they are heeding the mistakes and missteps of the Networx contract. GSA expects to issue a RFP in November and make the first awards in May 2015.