Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
The STEM leader profile clearly shows the STEM leader is unlikely to be effectively served by traditional leader development programs.
Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
Van Hitch, senior advisor for Deloitte's Federal Practice, and former Justice Department CIO, joins host Roger Waldron to talk about how cloud computing, mobile technology, and other IT advances can help your agency become more efficient.
February 4, 2014
West Health's Kerry McDermott, and the Office of Science and Technology's chief science officer, Dr. Douglas Fridsma, will discuss this week's Healthcare Innovation Day, and new developments in healthcare interoperability.
February 4, 2014
Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.
Federal News Radio Executive Editor Jason Miller brings you IT news you might have missed.
Last month the Homeland Security Department published its updated National Infrastructure Protection Plan, a governmentwide framework for securing critical infrastructure on a wide scale. The aim of the updated plan is to make all sectors of critical infrastructure more "resilient" -- better able to absorb and recover from natural disasters, terrorist attacks, cyber intrusions and other adverse conditions.
Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.
Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.
Ram Murthy, the RRB chief information officer, is following a four-year IT enterprise roadmap to modernize his agency's back-office systems.
January 30, 2014
GSA and DoD release six suggestions for how to better integrate cybersecurity in the acquisition progress. The recommendations are one of the deliverables under the cyber Executive Order President Obama signed last February. GSA will release a RFI in the coming weeks to let industry and others comment on how best to begin implementation.
More agencies are recognizing the growing importance of keeping data private after recent information leaks and cyber breaches. The Federal Trade Commission is among the agencies at the head of the pack and is relying on best practices.
Brian Ahier, president of Advanced Health Information Exchange Resources, discusses the state of the healthcare IT system and how to use technology to improve it.
January 28, 2014
For the first time since 2010, citizen satisfaction with federal government services dropped last year, according to a new report from the American Customer Satisfaction Index. The average overall citizen satisfaction with the government's services fell 3.4 percent in 2013 to a score of 66.1 points (on a 100-point scale). Much of the decline is attributable to a "deterioration in satisfaction" with federal websites, which users found "more difficult to navigate, less reliable, and the information provided less useful" than in years past, according to the report.
Most people don't think about critical infrastructure until the power goes out, or fresh drinking water doesn't flow from the tap. But the federal government has mapped out a plan with the help of industry, to safeguard the nation's critical infrastructure. On this edition of "AFCEA Answers", we'll discuss the nuances of the newly-released National Infrastructure Protection Plan with Suzanne Spaulding, the acting Department of Homeland Security Undersecretary for the National Protection and Programs Directorate; and Jill Singer, a partner with Deep Water Point consulting in McLean, Virginia.
The Office of Management and Budget's markup of the Senate's version of the bill changes language around requiring data standards and how the information should be published. Open government advocates are concerned about OMB's suggestions.
Rep. Jeff Miller (R-Fla.) wants answers from the Veterans Affairs Department after its latest privacy and cyber breach of the data of more than 5,000 veterans through its eBenefits portal. VA says it has fixed the software defect and its Data Breach Core Team is investigating what happened.