Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
The 2013 FISMA report to Congress shows the Veterans Affairs Department continues to struggle with cybersecurity and has more than 6,000 items on its plans of actions and milestones and continued weaknesses in access and configuration management controls. VA CIO Stephen Warren details several initiatives to address many of the 35 recommendations.
Jonathan Baker, deputy chief engineer of the Delta IV Launch System at the Air Force Space and Missile Center Launch Systems Directorate in El Segundo, California, helped save the Air Force billions of dollars and a lot of stress on its satellite launches.
Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.
Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
You are the key to stopping an insider threat and preventing a cyber incident at your agency even if you don't work in the IT department. Richard Stiennon is the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. He says there are two categories of insider threats and identifying the most dangerous kind depends on you.
May 29, 2014:Today, Jason Miller, WTOP and Doug Bourgeois, VMware, and Stuart Fleagle, Carpathia discuss the case for Hybrid Cloud. Major transformation is underway that affects how we live and work. This transformation is enabled by technological innovation, particularly by Cloud Computing and the Mobile Internet. For Federal IT organizations to successfully deliver this Transformation, they need to fully embrace their existing investments to leverage a hybrid cloud. A carefully architected hybrid cloud approach that leverages previous private cloud investments will help drive compatibility across a multi-cloud environment, and minimize the ‘silos of clouds' that are popping up today. Listen in to the discussion, and see what they have to say about the intersection of technology and transformation.
Allison Hickey, VA's undersecretary for benefits, said VBMS has transformed the agency from a paper system to one that mostly relies on electronic data. Some lawmakers express concern about the way the agency is measuring how it reduces the number of veterans waiting for benefits.
Mike Olson, board chairman and chief strategy officer of Cloudera, will talk about some of the tools your agency can use to manage its stored data.
May 27, 2014
Listen Tuesday May 27th @ 12pm
In a repeat performance from last year, the House has included a major IT procurement reform plan as part of the 2015 Defense Authorization bill. Last year it got removed in conference. But this year a similar bill is rattling around the Senate. Plus, there have been some changes in the content of the House version. Trey Hodgkins is senior vice president for the public sector at the Information Technology Industry Council. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the significant changes made in this year's version of FITARA.
DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
May 23, 2014
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.
Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.
The General Services Administration received responses Thursday from vendors on how to shape the first major acquisition under the Network Services 2020 program. Officials say they are heeding the mistakes and missteps of the Networx contract. GSA expects to issue a RFP in November and make the first awards in May 2015.
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.
Alan Lindenmoyer, program manager in NASA's Commercial Crew and Cargo Program at the Johnson Space Center, spearheaded the effort to use private industry to provide the space agency's orbital transportation services.