Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The Defense Department has some significant blind spots when it comes to its ability to assess what's going on in the global technology landscape -- especially in the commercial and non-defense markets. DoD officials are keenly aware of the problem, and there's a nascent effort underway to help solve it. The new Technology Domain Awareness initiative is a project of DoD's Information Analysis Centers. Christopher Zember is the director of the Information Analysis Centers. And Jay Harrison is the director of the Center for Smart Defense at West Virginia University, which is helping DoD get the TDA effort of the ground. They explained the initial drive behind TDA on In Depth with guest host Jared Serbu.
The Justice Department is asking Congress for more resources to fight cybercrime. Yesterday, a top official told Senators cyber criminals are becoming so sophisticated that the department, and the FBI in particular, are adapting their tactics and tools on a minute-by-minute basis. That might not be fast enough. The FBI estimates 500 million computers are infected by botnets each year, meaning that there are 18 victims per second. Levi Gundert is a former secret service agent and now a technical lead with Cisco's Threat Research, Analysis and Communications team. He told Emily Kopp on the Federal Drive that the government deserves credit for building partnerships that can track and find cyber criminals.
Chris Carlson, CEO of Retriever Consulting, discusses the benefits of a new aspect of virtualization called containers.
July 15, 2014
Threat intelligence in many ways is another form of big data. But the difference is the value of this information is much more clear than just any sort of big data that an organization collects.
At the same time, the amount of cybersecurity data coming into agencies or organizations is ever increasing especially as the tools and sensors get better.
Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
July 14, 2014
Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
July 11, 2014
Report: Chinese hackers break into US personnel networks, target security clearance files
Amid need for intelligence in Afghanistan, top Army brass defend troubled intel tech system
The Navy thinks 3D printing can eliminate a wide range of challenges with its supply chain. The service is already testing the idea of using additive manufacturing technologies to build small spare parts aboard ships, as they're needed, rather than having to transport them from supply ships or distant warehouses. And one day, the service thinks the technology could even be able to build a small UAV at the press of a button. Carolyn Lambeth is a mechanical engineer for Combat Direction Systems Activity at Dam Neck, Virginia. She explained the future of 3D printing at the Navy on In Depth with Francis Rose.
"Big data," "data to decisions," and "data analytics" are all big buzz words in government at the moment as agencies try to harness the power of computing to leverage the information they already collect into better decision making. But in most cases, the data itself isn't worth much unless experienced people combine it with their own judgment. Dan Saaty is the chief technology officer and co-founder of Decision Lens, a Virginia company that helps crunch numbers for organizations ranging from intelligence agencies to NFL franchises. He said on In Depth with Francis Rose if organizations want to use data to help guide their decisions, the first thing they need to do is set priorities.
The General Services Administration's Net-Zero Energy Task Group is planning to produce a draft letter with clear goals and guidance for net-zero energy buildings by this September.
Members of the U.S. Intelligence Community have found themselves to be the source of a good deal of scrutiny in recent years, not all of it welcome. In this exclusive two-part interview, the Honorable James Clapper, Jr., Director of National Intelligence, discusses recent efforts to stem news leaks in the Intelligence Community; a new "roadmap" outlining the IC's technology requirements in the future; and the effort to improve the speed and reliability of federal employee and contractor security clearances. Also we'll preview the upcoming Intelligence and National Security Summit, scheduled for Sept. 18-19 in Washington, and co-sponsored by INSA and AFCEA International.
Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."
Ready or not, here it comes. The Internet of Things, that is. The idea is simple: when all sorts of objects have IP addresses and access to wireless networks, you can measure almost anything. As a practical matter, the Internet of Things creates very big data sets that are hard to handle from a network, management and analytics perspective. Anthony Robbins, vice president of federal for Brocade, joined Tom Temin and Emily Kopp on the Federal Drive with advice.
When it comes to critical infrastructure cybersecurity, White House policy has federal agencies and the private sector joined at the hip. So it matters to the federal government how good the private sector is at cyber. Unisys and the Poneman Institute surveyed companies who operate critical infrastructure. The picture isn't great. Mark Cohn, the chief technology officer of Unisys Federal Systems, joined Tom Temin and Emily Kopp on the Federal Drive to discuss the results of the survey.
For the Department of Homeland Security, making its 22 components' radio systems interoperable with one another has been an objective since the department was created in 2003. But today, DHS still can't account for all of its communications assets -- let alone get them to talk to each other. Last night, the House passed legislation designed to get things moving. Rep. Donald Payne (D-NJ) is the ranking member of the House Subcommittee on Emergency Preparedness and the prime sponsor of the DHS Interoperable Communications Act. He explained the details of the bill on In Depth with Francis Rose.
The technical name for one of the Army's communications networks is Warfighter Information Network-Tactical Increment Two. But some soldiers prefer to call it their digital guardian angel. Another calls it the holy grail of communication. Now one of the creators of the Army's WIN-T system is receiving prestigious recognition for his role in its creation. Patrick DeGroodt is Deputy Project Manager for the Department of the Army. He's a Service to America medal finalist in the National Security and International Affairs category. He explained the creation process on In Depth with Francis Rose. Read a Q&A with DeGroodt.
The General Services Administration announced Wednesday it's seeking to roll out a new category especially for cloud services under its massive IT Schedule 70 contracting vehicle. Maynard Crum, acting director of the Office of Strategic Programs in GSA's Office of Integrated Technology Services, announced the agency's pursuit of a new special-item number for cloud — or cloud SIN — during a panel discussion at the Federal Cloud Computing Summit in Washington, D.C.
Former DHS technology leader Dan Katz believes the continued surge in the amount of data produced daily will provide a "renaissance, of really innovative, really high-value solutions" to the government's open data issues.