Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Today, agencies are expected to maintain a social media presence, not just a website. A new Manager's Guide from the IBM Center for the Business of Government looks at social media efforts across the government and how they support the strategic goals of the administration. Ines Mergel is associate professor of Public Administration at the Maxwell School of Citizenship and Public Affairs at Syracuse University and author of the report. She joined Tom Temin and Emily Kopp on the Federal Drive to discuss what it means to be effective with social media.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
Richard Cheng, principal consultant and training lead for Excella Consulting, will discuss how to apply agile software development at your agency.
June 17, 2014
Federal Chief Information Officer Steve VanRoekel says good management policies should be enough to improve how agencies buy, operate and deliver technology.
As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.
The Federal Communications Commission is challenging telecoms to work more closely with it to improve the nation's cybersecurity. FCC Chairman Tom Wheeler says he is not planning more regulations, rather he is asking the companies to share responsibility. Federal News Radio's Executive Editor Jason Miller joined Tom Temin and Emily Kopp on the Federal Drive to discuss the FCC's plans. Read Jason's related article.
As the Navy retakes control over its own IT networks, it is eager to introduce features that improve the experience for end users. At the same time, the Navy is warning vendors that it's not going to buy just bells and whistles. Federal News Radio's Jared Serbu reports. Read Jared's related article.
Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.
By September, the Navy anticipates it will have retaken full ownership of its main IT network after having outsourced it a decade earlier. The service says it wants to find ways to bring innovation into NMCI, but vendors will have to meet some checkpoints along the way.
Haley Van Dyck will move on from her role at the Office of Management and Budget at the end of August after more than two years. She oversaw the innovation portfolio for the E-Government and IT office.
IBM wins first contract in Navy's new "tiered" approach to data center consolidation. The service plans to award several more contracts between now and the end of fiscal 2014.
Bill Zielinski, the Social Security Administration's chief information officer, said storage in the cloud and the greater use of virtualization are among the prerequisites for the agency before it moves into its new data center this summer.
The former FAA and DHS CIO is taking a third tour of duty in government and will replace Simon Szykman.
The first solicitation will address near-term fixes for the current application. The second one will look to commercial technology for a wholesale replacement of the scheduling application. VA says it will build off the contest it ran in 2013 where it awarded $3 million to competitors to develop VISTA-friendly scheduling software.
EEOC CIO Kimberly Hancher and Mike Cerniglia from MicroPact discuss how cloud computing, and open sourcing reduced her agency's IT costs.
June 10, 2014
It keeps getting easier to manufacture a counterfeit computer chip. Experts say federal information systems increasingly are at risk because of flaws in their supply chains. It is not just a question of fake parts. Genuine ones that have been tampered with, or are just poorly made, can cause damage. The National Institute of Standards and Technology is revising guidelines for agencies to help them secure their supply chains. Jon Boyens is an IT specialist in the security outreach and integration group at NIST. He spoke with Emily Kopp on the Federal Drive.
Listen Tuesday June 10th @ 12pm
Inside the Reporter's Notebook: FedRAMP compliance results months away, OMB's word of the year: Effectiveness
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.