Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.
Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.
Ram Murthy, the RRB chief information officer, is following a four-year IT enterprise roadmap to modernize his agency's back-office systems.
January 30, 2014
GSA and DoD release six suggestions for how to better integrate cybersecurity in the acquisition progress. The recommendations are one of the deliverables under the cyber Executive Order President Obama signed last February. GSA will release a RFI in the coming weeks to let industry and others comment on how best to begin implementation.
More agencies are recognizing the growing importance of keeping data private after recent information leaks and cyber breaches. The Federal Trade Commission is among the agencies at the head of the pack and is relying on best practices.
Brian Ahier, president of Advanced Health Information Exchange Resources, discusses the state of the healthcare IT system and how to use technology to improve it.
January 28, 2014
For the first time since 2010, citizen satisfaction with federal government services dropped last year, according to a new report from the American Customer Satisfaction Index. The average overall citizen satisfaction with the government's services fell 3.4 percent in 2013 to a score of 66.1 points (on a 100-point scale). Much of the decline is attributable to a "deterioration in satisfaction" with federal websites, which users found "more difficult to navigate, less reliable, and the information provided less useful" than in years past, according to the report.
Most people don't think about critical infrastructure until the power goes out, or fresh drinking water doesn't flow from the tap. But the federal government has mapped out a plan with the help of industry, to safeguard the nation's critical infrastructure. On this edition of "AFCEA Answers", we'll discuss the nuances of the newly-released National Infrastructure Protection Plan with Suzanne Spaulding, the acting Department of Homeland Security Undersecretary for the National Protection and Programs Directorate; and Jill Singer, a partner with Deep Water Point consulting in McLean, Virginia.
The Office of Management and Budget's markup of the Senate's version of the bill changes language around requiring data standards and how the information should be published. Open government advocates are concerned about OMB's suggestions.
Rep. Jeff Miller (R-Fla.) wants answers from the Veterans Affairs Department after its latest privacy and cyber breach of the data of more than 5,000 veterans through its eBenefits portal. VA says it has fixed the software defect and its Data Breach Core Team is investigating what happened.
The newest industry technology association is recruiting new members and contributing to the discussion to improve federal IT acquisition. But in the short term, ITAPS faces a court decision on Feb. 7 whether the lawsuit filed by TechAmerica against it and three employees goes forward.
The Administration's establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost.
As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of Cloud Computing Brokerage, a means to integrate software-as-a-service economically with the agility and flexibility the agency needs.
The National Defense University's Information Resources Management College offers 12 certificate courses and a master's of science degree in government information leadership to help current and future CIOs sharpen their technology and management skills.
January 23, 2014
More than 60 social media apps are now available to agencies, allowing them to select the best method to meet their missions. One of the areas that's most ripe for innovation is in emergency management.
A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.
The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.
Dolly Oberoi, CEO of C2-Technolgies, will discuss online training and how the federal government can use it to reduce costs and improve benefits.
January 21, 2014
Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.
A group of federal scientists is concerned that proposed restrictions on federal employees attending conferences could put scientific research behind the curve. The Assembly of Scientists wrote to the two top senators on the Homeland Security and Government Affairs Committee last week, arguing that the Digital Accountability and Transparency (DATA) Act would likely lead to a "decline in the productivity, creativity, morale, recruitment and retention" of many of the government's top scientists.
HHS and CMS cyber officials tell House lawmakers the Affordable Care Act portal is meeting or exceeding industry best practices for information assurance.