Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.
It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.
As President Barack Obama proclaims a National Day of Making, the National Institute of Health made 3-D files publicly available online.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
Steven VanRoekel, the federal chief information officer, joined Federal News Radio for a free online chat to discuss the White House's latest IT priorities. View an archived version of the discussion.
As businesses face ever growing data diversity and volume, Enterprise Data Management is moving beyond established EDW and ETL practices toward logical data warehousing strategies that include different mechanisms and tools. In a world where big data has entered into common practice, NoSQL is coming into its own because we are constantly reminded that 80% of our data is unstructured and so a new generation of databases is needed to help deal with it. Why is NoSQL important to organizations/agencies? This panel will discuss ACID Enterprise Compliance, NoSQL vs. Relational Technologies, Enterprise NoSQL addressing security, transactions, availability and scalability.
Today, agencies are expected to maintain a social media presence, not just a website. A new Manager's Guide from the IBM Center for the Business of Government looks at social media efforts across the government and how they support the strategic goals of the administration. Ines Mergel is associate professor of Public Administration at the Maxwell School of Citizenship and Public Affairs at Syracuse University and author of the report. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss what it means to be effective with social media.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
Richard Cheng, principal consultant and training lead for Excella Consulting, will discuss how to apply agile software development at your agency.
June 17, 2014
Federal Chief Information Officer Steve VanRoekel says good management policies should be enough to improve how agencies buy, operate and deliver technology.
As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.
The Federal Communications Commission is challenging telecoms to work more closely with it to improve the nation's cybersecurity. FCC Chairman Tom Wheeler says he is not planning more regulations, rather he is asking the companies to share responsibility. Federal News Radio's Executive Editor Jason Miller joined Tom Temin and Emily Kopp on the Federal Drive to discuss the FCC's plans. Read Jason's related article.
As the Navy retakes control over its own IT networks, it is eager to introduce features that improve the experience for end users. At the same time, the Navy is warning vendors that it's not going to buy just bells and whistles. Federal News Radio's Jared Serbu reports. Read Jared's related article.
Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.
By September, the Navy anticipates it will have retaken full ownership of its main IT network after having outsourced it a decade earlier. The service says it wants to find ways to bring innovation into NMCI, but vendors will have to meet some checkpoints along the way.
Haley Van Dyck will move on from her role at the Office of Management and Budget at the end of August after more than two years. She oversaw the innovation portfolio for the E-Government and IT office.
IBM wins first contract in Navy's new "tiered" approach to data center consolidation. The service plans to award several more contracts between now and the end of fiscal 2014.
Bill Zielinski, the Social Security Administration's chief information officer, said storage in the cloud and the greater use of virtualization are among the prerequisites for the agency before it moves into its new data center this summer.