Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
With 50 billion devices connected to the Internet, the rules of cybersecurity are changing. Agencies and more companies are on to the importance of cybersecurity, but they might be watching out for high-profile threats rather than more common and stealthy problems that can do lots of damage. That's what Cisco has found and will release in a report. Levi Gundert is the technical lead for Cisco's Threat Research, Analysis and Communications, or TRAC. He spoke with Tom Temin and Emily Kopp on the Federal Drive.
A Government Accountability Office probe of USASpending.gov, the government's awards website, found that while contracting information was generally correct, only 2-to-7 percent of awards listed on the site perfectly matched agency data. GAO recommended better record keeping policies be set by the Office of Management and Budget to avoid inconsistencies.
Sonny Hashmi issued a memo requiring agency software developers to look at open source before they consider traditional commercial solutions.
Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.
Sonny Hashmi, chief information officer at the General Services Administration, joins Federal News Radio for a free online chat to discuss everything from mobility to zero-based budgeting and collaboration, among other topics.
This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA's College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.
Less than 1 percent of the artifacts at the Smithsonian Institution are on public display. But 3-D printing could help the agency send millions more artifacts to museums and schools around the world. Gunter Waibel is director of the Digitization Program Office, and Adam Metallo is 3-D Program Officer of the Smithsonian Institution. They're both Service to America medal finalists in the Citizen Services category, and explained their pioneering work on In Depth with Francis Rose. View a gallery of all the Sammies finalists.
Just as the Pentagon depends on DARPA to keep the military on the cutting edge of science and technology, so too, does the Department of Homeland Security have an ARPA to keep DHS agencies out on the technological edge. On this edition of AFCEA Answers, Dr. Adam Cox, Acting Director of the Homeland Security Advanced Projects Research Agency (HSARPA) discusses the similarities - and the differences - between his organization and DARPA. He explains how "tech foraging" allows HSARPA to meet customer needs while saving taxpayers a buck or two. And he offers an unclassified look at some forward thinking technological solutions now being developed for transportation and border security.
Kay Ely, GSA's director of IT schedule programs in the Federal Acquisition Service, said removing 1,000 vendors who weren't meeting the minimum annual sales requirement of $25,000 a year is saving the agency about $3.2 million a year in administrative costs. At the same time, GSA is adding 30-to-40 new vendors each month to Schedule 70 as part of its effort to make sure agency customers have access to new, innovative companies.
Ash Ashutosh, CEO of Actifio, will discuss how his company can help your agency reduce the size and cost of its data center.
July 29, 2014
The National Association of Corporate Directors' (NACD) Handbook on Cyber-Risk Oversight, introduced Tuesday at the National Press Club in Washington, outlines five key principles that aim to move forward the collaborative cybersecurity effort.
About 83,000 Defense Department employees and contractors, who held or were determined eligible for a security clearance, owed more than $730 million in unpaid taxes as of June 2012, according to a new report from the Government Accountability Office. Per GAO's recommendations, the Office of Personnel Management, Office of the Director of National Intelligence and DoD are now working to include tax-compliance checks to enhance security clearance processes.
Uncle Sam a venture capitalist? Imagine a board room with honchos from government, finance and Silicon Valley. A board of directors for the federal government, solving its toughest challenges with the latest concepts and cutting edge technology. Keith Trippie is CEO of the Trippie Group and a former Homeland Security executive. He says if the government follows a Silicon Valley venture capital model the taxpayer would win. He joined Tom Temin and Emily Kopp on the Federal Drive to explain why.
Agencies have until Oct. 1 to make competitive employment training grants more job-driven, according to a memo from the Office of Management and Budget. This follows the push from both President Barack Obama and Vice President Joe Biden for agency training programs to focus on connecting employees to the right jobs.
If you want to wave a red flag to get contractors' hackles up, just say the words, "lowest-price, technically acceptable." It may not sound like best value, but in a world of tough budgets, that's the way agencies are going. How can the strategy work for both sides? Kenneth Gilliland, an attorney with the Army's Armament Research, Development and Engineering Center spoke to Tom Temin at the National Contract Management Association World Congress at National Harbor. View photos and listen to more interviews from the conference.
Chief legal counselor to NSA says intelligence disclosures may have set back efforts to improve nation's cybersecurity posture because of increasing unease about public-private cooperation, and that it's time to reexamine the digital privacy trust relationship between government and the public.
Listen Tuesday July 29th @ 12pm
The Pentagon's main IT provider shuttered its large data center in Huntsville, Alabama. in May, leaving only 10 of its large Defense Enterprise Computing Centers in its inventory. The mission of those remaining DECCs, however, is growing, not shrinking.
Inside the Reporter's Notebook: Category management launches five pilots; more vendor past performance data
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.