Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A computer hacker facing up to 20 years in prison is free after helping the federal government stop hundreds of cyberattacks. He taught agencies how to protect millions of dollars and cripple the hacker group Anonymous. Retired Air Force Maj. Gen. Dale Meyerrose was chief information officer for three Air Force commands and three joint combatant commands. He was also the first CIO of the Office of the Director of National Intelligence and is now president of the Meyerrose Group. He joined In Depth with Francis Rose to explain what kind of precedence this sets for future cybersecurity policies.
Secretary of Defense Chuck Hagel met in Singapore late last week with that nation's defense minister, Dr. Ng Eng Hen. The two met on the sidelines of the annual Shangri-La Dialogue, a major annual forum for key leaders in the Asia-Pacific region to discuss security challenges and opportunities. Hagel thanked Ng for his strong support of the relationship the two militaries continue to enjoy. They also discussed a range of regional security issues, to include tensions in the South and East China seas, recent events in Thailand, defense reforms in Japan, and the need for a continued focus on dialogue, cooperation and the peaceful resolution of disputes in the region.
Inside the DoD Reporter's Notebook: DoD drills down on service contracting; a controversial decision on contractor pay
"Inside the DoD's Reporter's Notebook" is a bi-weekly feature focused on news about the Defense Department and defense community as gathered by Federal News Radio DoD Reporter Jared Serbu. Submit your ideas, suggestions and news tips to Jared via email.
The debate to change the Army's force structure is switching focus from "should they do it" to "how." One strategy is a Commission on the Structure of the Army. Frank Hoffman, a senior research fellow at the Institute for Strategic Studies at the National Defense University, tells In Depth with Francis Rose a commission would be a big step backwards in the effort to make the Army more affordable.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.
The House panel that decides defense spending came out with a $570 billion blueprint Thursday that spares the USS George Washington aircraft carrier, gives military personnel a 1.8 percent pay raise and rebuffs Pentagon efforts to make troops and their families pay slightly more for housing and groceries at on-base commissaries.
Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.
Counter-terrorism is a key tenet of President Barack Obama's foreign policy plan going forward. He said in a speech at West Point on Wednesday, "the most direct threat to America at home and abroad remains terrorism. But a strategy that involves invading every country that harbors terrorist networks is na´ve and unsustainable." His plan is to advise and assist countries facing significant terrorism threats and help build the capacity to deal with threats on their own.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
Congress is hollowing out the Defense Department and turning the nation's military into a paper tiger of global proportions. That's according to Bryan Clark, a senior fellow at the Center for Strategic and Budgetary Assessments and a former special assistant to the Chief of Naval Operations. He joined In Depth with Francis Rose for Pentagon Solutions today. He and his colleague Todd Harrison write about the Defense Department's fiscal 2015 budget process on Capitol Hill and how it forces the Pentagon to ignore its own budgetary wisdom.
Officials: Army relieves hospital chief of command; Hagel orders military health system review
The leadership displayed by his fellow prisoners at the Hanoi Hilton prison camp inspired the leadership lessons Lee Ellis teaches as part of his job as a leadership consultant.
President Barack Obama has announced that 9800 troops will be left behind next year when all combat troops pull out of Afghanistan. Secretary of Defense Chuck Hagel said in a statement, "I strongly support the president's decision to maintain a limited U.S. troop presence in Afghanistan after our combat mission ends there later this year." Hagel said the move will do two things: "it will help ensure that al-Qaida cannot reconstitute itself in Afghanistan, and it will help us sustain the significant progress we have made in training and equipping the Afghan national security forces."
The Professional Services Council has launched a new initiative to focus on technology policy. It's picked a defense insider to lead it. Dave Wennergren served in the Defense Department until 2013 when he joined the contractor CACI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the latest chapter in his career.
Judging from the Defense authorization bills that have passed the House and been marked up in the Senate, Congress seems to have made a hash out of Pentagon plans to meet its budgetary goals. Todd Harrison is a senior fellow at the Center for Strategic and Budgetary Assessments. He joined Tom Temin and Emily Kopp on the Federal Drive to help sort out the reality of where Defense spending is headed and who will benefit.
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
AP Exclusive: Bungled nuke silo security drill prompted more training for nightmare scenarios
Defense Secretary Chuck Hagel addressed Naval Academy graduates last week during their commencement ceremonies and he gave them three pieces of advice. One, "connect with people on a personal level", two, "try to understand perspectives that are different from yours" and three, "be humble". He also cautioned them about pressure saying, "Once you take up your duty stations and the responsibility of leadership, you will find yourselves under tremendous pressures you've never experienced."
When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.
The House passed its version of the annual defense authorization bill Thursday, while the Senate's is still a work in progress. Both versions mostly shun DoD's proposals to cut costs during sequestration.