Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A new memo from CTO Todd Park requires agencies to update their open government plans by June 1. The plans should include new efforts as well as progress reports on current initiatives.
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
George Komatsoulis, the National Cancer Institute's deputy director of the center for biomedical informatics and IT, and acting chief information officer, said through the Cloud Atlas Genome project, NCI is trying to reduce costs to access data by medical research institutions and to make sharing of the this data and collaboration easier.
Agencies must use only cloud services that have been approved under the Federal Risk Authorization and Management Program (FedRAMP) by June. OMB will receive more details on agency progress with the latest quarterly update through PortfolioStat. Meanwhile, FedRAMP's security baseline will be revised this summer.
The Pentagon is implementing most of the recommendations it made in 2010's Section 804 report to Congress. Katrina McFarland, DoD's assistant secretary for acquisition, said initial results of the change are promising. But an upcoming GAO report is expected to show DoD has a long way to go to move toward an agile, incremental approach to IT systems development.
Randy Wood, federal vice president of F5 Networks will discuss how Software Defined Application Services or SDAS, can benefit your agency.
February 25, 2014
As part of its "Stop Government Abuse Week," lower chamber lawmakers will vote on 12 bills this week to help bring more accountability and transparency to the government. An updated version of the Federal IT Acquisition Reform Act is expected to be among them.
Navy Cyber Forces, already headquartered in Suffolk, Va., will take over responsibility for building the knowledge workforce the Navy terms the "information dominance corps."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
Departments have a week to finalize their plans to implement information security continuous monitoring by 2017. State and DHS already are heading down the new cyber path, and are excited to take advantage of the standard suite of products and services under the CDM contract.
The Army plans to release guidance by the end of March to transition vast repositories of data and processing capacity from Army-owned systems to joint DoD facilities by 2018. The service is on track to close 200 centers by 2015.
Budget restrictions are forcing agencies to look for ways to contain costs while serving their mission needs. Agencies are turning to desktop virtualization to enable access, securely, anywhere and anytime. This serves to empower employees to use their own devices, applications, email and data to move beyond their offices and bring to meet the flexible needs of today's government workforce. This panel explores how agencies are reducing operational costs while providing secure access for government information to meet mission needs.
Annette Moore, the chief information officer at the Johnson Space Center, said she's reshaping her office to be more flexible and agile in meeting the IT needs of the mission areas.
February 20, 2014
Homeland Security cancels plan for private firm to give access to license plate information
The Pentagon will release a new strategy Thursday to address the growing spectrum needs. It will emphasize agile sharing of radio spectrum between government and industry.
Rafael Borras, undersecretary for management at the Homeland Security Department for the last four years, who recently left DHS to return to the private sector, said the Homeland Security Department needs a tactical, sustained effort to improve employee satisfaction. He said that kind of effort has helped change the way DHS oversees and implements IT programs.
Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.
This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.
Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency.
February 18, 2014
The Pentagon leverages the buying power of 2.6 million DoD personnel in the Air Force, Army and Defense Information Systems Agency in signing joint enterprise license agreement with CDW-G.
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.