Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.
PortfolioStat is widely deployed across federal agencies and thus well worth exploring how we may be able to maximize the benefits derived from it.
Agency officials said Thursday that they will switch from a custom-built to a commercial-off-the-shelf approach to modernize TECS, a mainframe system that has been operating for more than a quarter of a century. ICE spent more than $60 million before deciding to change directions after realizing the custom-built approach wouldn't work.
DoD opens its electronic medical records to VA claims processors for the first time. The goal is to shave days or weeks from the time it takes VA to decide disability claims for recently separated service members. But the launch of the system has had a few bugs.
EPA's "How's My Waterway?" app earned the most votes out of eight finalists in ACT-IAC's Igniting Innovation awards. The site takes public data, simplifies it and adds new technology to make it easier to find and use by the public.
Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
The STEM leader profile clearly shows the STEM leader is unlikely to be effectively served by traditional leader development programs.
Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014
Listen Tuesday March 11th @ 12pm
Program will discuss the following: Progress Made in Using Mobility in Government, Profiles of Successful Mobility Programs, Mobility Priorities in Government, Challenges or major hurdles to still overcome, and A Vision for The Future.
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
Van Hitch, senior advisor for Deloitte's Federal Practice, and former Justice Department CIO, joins host Roger Waldron to talk about how cloud computing, mobile technology, and other IT advances can help your agency become more efficient.
February 4, 2014
West Health's Kerry McDermott, and the Office of Science and Technology's chief science officer, Dr. Douglas Fridsma, will discuss this week's Healthcare Innovation Day, and new developments in healthcare interoperability.
February 4, 2014
Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.
Federal News Radio Executive Editor Jason Miller brings you IT news you might have missed.
Last month the Homeland Security Department published its updated National Infrastructure Protection Plan, a governmentwide framework for securing critical infrastructure on a wide scale. The aim of the updated plan is to make all sectors of critical infrastructure more "resilient" -- better able to absorb and recover from natural disasters, terrorist attacks, cyber intrusions and other adverse conditions.
Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.
Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.
Ram Murthy, the RRB chief information officer, is following a four-year IT enterprise roadmap to modernize his agency's back-office systems.
January 30, 2014
GSA and DoD release six suggestions for how to better integrate cybersecurity in the acquisition progress. The recommendations are one of the deliverables under the cyber Executive Order President Obama signed last February. GSA will release a RFI in the coming weeks to let industry and others comment on how best to begin implementation.