Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
In a repeat performance from last year, the House has included a major IT procurement reform plan as part of the 2015 Defense Authorization bill. Last year it got removed in conference. But this year a similar bill is rattling around the Senate. Plus, there have been some changes in the content of the House version. Trey Hodgkins is senior vice president for the public sector at the Information Technology Industry Council. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the significant changes made in this year's version of FITARA.
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
May 23, 2014
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.
Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.
The General Services Administration received responses Thursday from vendors on how to shape the first major acquisition under the Network Services 2020 program. Officials say they are heeding the mistakes and missteps of the Networx contract. GSA expects to issue a RFP in November and make the first awards in May 2015.
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.
Alan Lindenmoyer, program manager in NASA's Commercial Crew and Cargo Program at the Johnson Space Center, spearheaded the effort to use private industry to provide the space agency's orbital transportation services.
The Defense Department and Intelligence community are starting to work together as they build similar paths to new enterprise information technology structures.
Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
Ken Parent and Manny Mencia of ByteGrid, will discuss how their company can help your agency secure and protect its data.
May 20, 2014
The deadline to earn certification for the Federal Risk and Authorization Management Program is only a couple of weeks away. The General Services Administration is scheduling two events to further educate cloud security vendors and federal agencies
While many people may think NASA is focused on space and looking at the stars alone, NASA research physical scientist Miguel O. Román is using satellite data to monitor changes in the Earth's environment.
Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
May 19, 2014
Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.
A signature open-government initiative of the Obama administration is turning five years old this week. The website Data.gov is home to more than 100,000 individual agency data sets. It's also the destination of app developers hoping to turn federal data into useful information. Marion Royal is the director of Data.gov, which is run by the General Services Administration. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the website has progressed over the years.
Security breaches in government and the private sector show that no network is completely safe. Now with funding from the State Department and USAID, the New America Foundation is promoting the idea of what it calls mesh networks — small, home-built communications systems that don't rely on the Internet. Sascha Meinrath is the founder of the Open Technology Institute at the New America Foundation. He joined Tom Temin and Emily Kopp on the Federal Drive and said the networks can support things like phone service, file sharing, and instant messaging.