Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
In the fiscal 2015 budget, the White House laid out initiatives that fall under each of the four pillars of the management agenda. The federal IT budget would drop to $79.1 billion in 2015 -- down from $81.4 billion in 2014.
The Education Department's new security operations center reached initial operations capability in 2013 featuring six tools to improve the protection of its network and data. Steve Grewal, Education's chief information security officer, said a move to cloud and mobile computing requires the agency to have more visibility and accountability into how vendors protect its network.
March 6, 2014
A new memo from CTO Todd Park requires agencies to update their open government plans by June 1. The plans should include new efforts as well as progress reports on current initiatives.
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
George Komatsoulis, the National Cancer Institute's deputy director of the center for biomedical informatics and IT, and acting chief information officer, said through the Cloud Atlas Genome project, NCI is trying to reduce costs to access data by medical research institutions and to make sharing of the this data and collaboration easier.
Agencies must use only cloud services that have been approved under the Federal Risk Authorization and Management Program (FedRAMP) by June. OMB will receive more details on agency progress with the latest quarterly update through PortfolioStat. Meanwhile, FedRAMP's security baseline will be revised this summer.
The Pentagon is implementing most of the recommendations it made in 2010's Section 804 report to Congress. Katrina McFarland, DoD's assistant secretary for acquisition, said initial results of the change are promising. But an upcoming GAO report is expected to show DoD has a long way to go to move toward an agile, incremental approach to IT systems development.
Randy Wood, federal vice president of F5 Networks will discuss how Software Defined Application Services or SDAS, can benefit your agency.
February 25, 2014
As part of its "Stop Government Abuse Week," lower chamber lawmakers will vote on 12 bills this week to help bring more accountability and transparency to the government. An updated version of the Federal IT Acquisition Reform Act is expected to be among them.
Navy Cyber Forces, already headquartered in Suffolk, Va., will take over responsibility for building the knowledge workforce the Navy terms the "information dominance corps."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
Departments have a week to finalize their plans to implement information security continuous monitoring by 2017. State and DHS already are heading down the new cyber path, and are excited to take advantage of the standard suite of products and services under the CDM contract.
The Army plans to release guidance by the end of March to transition vast repositories of data and processing capacity from Army-owned systems to joint DoD facilities by 2018. The service is on track to close 200 centers by 2015.
Budget restrictions are forcing agencies to look for ways to contain costs while serving their mission needs. Agencies are turning to desktop virtualization to enable access, securely, anywhere and anytime. This serves to empower employees to use their own devices, applications, email and data to move beyond their offices and bring to meet the flexible needs of today's government workforce. This panel explores how agencies are reducing operational costs while providing secure access for government information to meet mission needs.
Annette Moore, the chief information officer at the Johnson Space Center, said she's reshaping her office to be more flexible and agile in meeting the IT needs of the mission areas.
February 20, 2014
Homeland Security cancels plan for private firm to give access to license plate information
The Pentagon will release a new strategy Thursday to address the growing spectrum needs. It will emphasize agile sharing of radio spectrum between government and industry.
Rafael Borras, undersecretary for management at the Homeland Security Department for the last four years, who recently left DHS to return to the private sector, said the Homeland Security Department needs a tactical, sustained effort to improve employee satisfaction. He said that kind of effort has helped change the way DHS oversees and implements IT programs.
Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.
This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.
Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency.
February 18, 2014