Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Scott Gaydos, chief technologist, Federal Healthcare, U.S. Public Sector, HP Enterprise Services, discusses how his company can help your agency with its cloud initiatives.
June 24, 2014
Richard Cheng, principal consultant and training lead for Excella Consulting, will discuss how to apply agile software development at your agency.
June 17, 2014
Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.
EEOC CIO Kimberly Hancher and Mike Cerniglia from MicroPact discuss how cloud computing, and open sourcing reduced her agency's IT costs.
June 10, 2014
The Data Aggregation Working Group, or DAWG, will deliver both plans and tools later this year to change the way agencies review and share terrorism information. DAWG members hope the reference architecture, as the plan is called, will give law enforcement and intelligence community agencies a new path toward understanding the full threat picture. Dirk Rankin is the chief technology officer for the National Counterterrorism Center and the co-chairman of the Data Aggregation Working Group. Paul Reynolds is the other co-chairman. In part two of their interview, they tell executive editor Jason Miller about the DAWG's role in creating a secure information sharing environment. Read Jason's related article.
The Data Aggregation Working Group, under the Information Sharing Environment, is creating a data aggregation reference architecture to give law enforcement and intelligence agencies a better approach to sharing information more securely and more quickly. The group ran two pilots and created a tool kit for others to use.
Chris Hornbecker, CEO of Xgility, will discuss how SharePoint can help your agency with collaboration.
June 3, 2014
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.
NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.
Ken Parent and Manny Mencia of ByteGrid, will discuss how their company can help your agency secure and protect its data.
May 20, 2014
A signature open-government initiative of the Obama administration is turning five years old this week. The website Data.gov is home to more than 100,000 individual agency data sets. It's also the destination of app developers hoping to turn federal data into useful information. Marion Royal is the director of Data.gov, which is run by the General Services Administration. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the website has progressed over the years.
Security breaches in government and the private sector show that no network is completely safe. Now with funding from the State Department and USAID, the New America Foundation is promoting the idea of what it calls mesh networks — small, home-built communications systems that don't rely on the Internet. Sascha Meinrath is the founder of the Open Technology Institute at the New America Foundation. He joined Tom Temin and Emily Kopp on the Federal Drive and said the networks can support things like phone service, file sharing, and instant messaging.
The Air Force thinks it's in a unique position with regard to the military's difficult migration into a shared IT infrastructure. It just went through the same exercise internally and believes those lessons can shape the Defense Department's Joint Information Environment.
Robyn East, Treasury's chief information officer, said users previously were not excited to move to an enterprise content management system, but a better understanding of the value of shared services has helped them come around.
The intelligence community and the Defense Department are both trying to build IT networks that attempt to get rid of IT stovepipes. In the process, they've found a few ways to work together.
Horace Blackman, vice president of Health and Life Sciences at Lockheed Martin will discuss ways to reduce costs for federal IT professionals.
May 13, 2014
Ojas Rege, vice president of Strategy for MobileIron, will explain how his company can help your agency develop its mobile strategy and manage its mobile devices.
April 22, 2014
The Defense Department and the intelligence community are both in the process of collapsing their IT stovepipes into common sets of IT services. While the governing bodies that oversee these two parallel efforts do communicate with one another, they have different operating models and objectives. Now, leaders are looking to see how they can connect the Venn diagrams and save money, time and effort in the process.
After two years of planning, the intelligence community is ready to start deploying the set of common IT services that make up the Intelligence Community Information Technology Enterprise (ICITE).