Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
"Fog bank" of threatened automatic spending cuts makes predicting Defense policy under a re-elected President Obama difficult. But experts agree DoD is likely to take more cuts, with or without sequestration.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Pentagon makes one more plea for a resolution to sequestration. A regular budget, an annual authorization bill and a resolution to the fight over cybersecurity laws would be helpful as well.
The service's new acquisition strategy tries to imagine the Army's needs over the next three decades as the focus shifts away from large counterinsurgency and stability operations.
Two brigades of the Army's 10th Mountain Division are training on a ready-to-go set of networking capabilities as they prepare to deploy to Afghanistan. The IT comes out of the Network Integration Evaluation process.
DISA wants a secure mobile device manager and app store to support at least 162,000 Apple and Android mobile devices. Contract would begin next spring.
Defense Secretary Leon Panetta said the financial health of service members is important for troop readiness. A new report by the Consumer Financial Protection Bureau details potential problems service members are facing.
After a decade of heavy land war, Marine Corps turns to energy efficiency as a way to lighten its load and return to its expeditionary maritime roots. The service already rolled out four technologies that reduce the amount of energy a marine uses. The Marines Corps also is spending hundreds of millions of dollars on developing and testing other energy efficient equipment.
Chris Devlin-Young is a Coast Guard veteran, who became partially paralyzed when his plane ran into a mountainside in 1982. Since then, he's won numerous world medals in the Paralympic sport of monoskiiing and does counseling work with wounded veterans.
The Defense Information Systems Agency sees itself as a safety valve for increasing pressure on military services' IT budgets. At a meeting of CIOs last week, DISA told the military services they could offload commodity IT services to their data centers.
Current definitions of cyberspace have led to confusion about roles, responsibilities, lanes in the road, a top Air Force general said Thursday. Senior leaders will convene a summit in November to zero-in on a common understanding of cyber.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
As service transitions to Air Force and DoD enterprise IT models, defining what technology services should be shared is still on the to-do list. The service's AFNet program is the umbrella effort to centrally-manage many commodity IT functions.
The Defense Department has marked the week of Oct. 1 as Absentee Voting Week. It's urging service members living overseas to register to vote and to take care of absentee balloting while there's still time for mail to make its way to and from local election jurisdictions.
Procurement will start with management of 5,000 mobile devices, plus app stores for consumers inside and outside of VA. The agency awarded a three-year, $9.3 million deal to Longview International Technology Solutions to build and manage the technology in the cloud.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.