Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
BlackBerry to lay off 4,500 or 40 percent of global workforce; posts nearly $1B 2Q loss
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Cheryl Cook, the Agriculture Department's chief information officer, said she's focusing on governance to improve mobile computing and reduce duplication among IT programs.
On this week's Capital Impact show, Bloomberg Government analysts examine the latest round of exhibit 300's for cloud computing opportunities, and give us an update on efforts to increase production of clean renewable fuels in the U.S.
September 19, 2013
How are agencies tackling the threats and vulnerabilities inherent in today's technology dependent government?
Continuous monitoring provides nearly real-time information in the face of cyber attacks and is essential for senior leaders making ongoing risk-based decisions that affect critical mission and business functions. OMB mandates and NIST guidelines require agencies to establish oversight mechanisms to evaluate systematically and ensure the continuing security, interoperability, and availability of systems and agency data. Tune into this interactive discussion to learn about the current state of risk management and how agencies are using continuous monitoring to maintain situational awareness of information security and organizational risk.
Senior uniformed Air Force leaders have agreed it's time to give more authority to the service's chief information officer. The CIO is drafting plans that will give it more say-so over planning the overall IT environment and the dollars targeted toward individual projects.
Jim Williams and Rick Holgate from ACT-IAC will fill us in on next month's 2013 Executive Leadership Conference in Williamsburg Virginia.
September 17, 2013
INSIDE THE REPORTER'S NOTEBOOK: FEMA to name Gardner as CIO; new DHS CIO close; NASA struggles with HSPD-12
News and buzz in the acquisition and IT communities that you may have missed this week.
The General Services Administration will focus on its core mission and let others provide payroll and human resources services. The decision comes as shared services is gaining momentum as OPM is pumping some energy back into the HR line of business, and the Interior will release a new geospatial platform to host data and applications.
After three years and multiple protests, the contract for the second generation e-travel system finally is decided. GSA awards CWTSato to compete with Concur Technologies to provide a travel management system to agencies.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
Speaking before the President's Council of Advisers on Science and Technology at the National Academy of Sciences Thursday morning, Steven VanRoekel, the federal chief information officer, said the President's second-term management agenda is building on past successes to make lasting change ordinary American citizens can feel in their everyday lives.
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
House leaders say the DATA Act has a good chance at becoming law this session. Support for the bill from the Senate and the White House seems to be increasing.
Robin Portman, executive vice president at Booz Allen Hamilton, will discuss what contractors and agencies are dealing with as they adjust to new budget realities.
September 10, 2013
Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency.
September 10, 2013
Current and former Obama administration officials' use of personal email addresses and secret, secondary email accounts to conduct official business came under scrutiny Tuesday at a hearing of the House Oversight and Government Reform Committee. Former EPA Administrator Lisa Jackson said her use of a secret account was to do her job more efficiently.
In part two of our look at Big Data, AFCEA Answers explores how the Defense Department is coping with gathering, storing, and analyzing the huge datasets from the growing universe of sensors available to the warfighter. Progress is being made in the five "V's": volume, velocity, variety, veracity, and value, but more work needs to be done, creating potentially profitable business opportunities for innovative firms in the IT industry.
On this week's edition of Agency of the Month, Nick Guertin, the Navy's director of Transformation in the Office of the Deputy Assistant Secretary of the Navy for Research, Development, Test and Evaluation, joins host Sean McCalley to discuss how online gaming is helping the Navy with its acquisition strategies.
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.