Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Rep. Jeff Miller (R-Fla.) wants answers from the Veterans Affairs Department after its latest privacy and cyber breach of the data of more than 5,000 veterans through its eBenefits portal. VA says it has fixed the software defect and its Data Breach Core Team is investigating what happened.
The newest industry technology association is recruiting new members and contributing to the discussion to improve federal IT acquisition. But in the short term, ITAPS faces a court decision on Feb. 7 whether the lawsuit filed by TechAmerica against it and three employees goes forward.
The Administration's establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost.
As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of Cloud Computing Brokerage, a means to integrate software-as-a-service economically with the agility and flexibility the agency needs.
The National Defense University's Information Resources Management College offers 12 certificate courses and a master's of science degree in government information leadership to help current and future CIOs sharpen their technology and management skills.
January 23, 2014
More than 60 social media apps are now available to agencies, allowing them to select the best method to meet their missions. One of the areas that's most ripe for innovation is in emergency management.
A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.
The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.
Dolly Oberoi, CEO of C2-Technolgies, will discuss online training and how the federal government can use it to reduce costs and improve benefits.
January 21, 2014
Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.
A group of federal scientists is concerned that proposed restrictions on federal employees attending conferences could put scientific research behind the curve. The Assembly of Scientists wrote to the two top senators on the Homeland Security and Government Affairs Committee last week, arguing that the Digital Accountability and Transparency (DATA) Act would likely lead to a "decline in the productivity, creativity, morale, recruitment and retention" of many of the government's top scientists.
HHS and CMS cyber officials tell House lawmakers the Affordable Care Act portal is meeting or exceeding industry best practices for information assurance.
GSA made the first set of awards under the continuous diagnostics and mitigation (CDM) contract.
Concerns about health care website security easing as recent testing successfully completed
McCormack will help bridge the political and career technology managers, especially as the Obama administration and Congress take on IT and acquisition reform in the wake of the HealthCare.gov debacle.
Listen Tuesday January 28th @ 12pm
Program will discuss the following: Progress Report on CyberSecurity in Government, Profiles of Successful Cyber Programs, Top Priorities, Challenges still to overcome, and A Vision for The Future in CyberSecurity.
The White House and the Information Sharing Environment released the Strategic Implementation Plan for the President's National Strategy for Information Sharing and Safeguarding. The plan details 16 initiatives that span federal, state, local and tribal governments as well as private sector and international partners.
January 16, 2014
As we begin the new year, we thought this would be a good time to recap some of our conversations from the first six months of "AFCEA Answers" broadcasts. From cloud to tactical radios, mobility to cybersecurity, and even a friendly debate about big data in the intelligence community, we'll have it all for you. Including top guests from government, industry and academia.
The platform, called Acropolis, is initially being used only for network operations and cybersecurity data, but officials plan to expand it to help solve big data challenges around financial and acquisition information.
Ravee Kurian and David Blackburn from Sapient will discuss how federal agencies can implement digital strategies to improve outcomes and reduce costs.
January 14, 2014
Government professionals are adopting mobile devices to enhance telework, improve communications, boost productivity and service their customers with greater ease. This discussion explores how agencies are managing costs, accessibility, and security requirements for mobile devices as well as discusses the current state of data privacy and steps agencies are taking to protect sensitive data and citizens' rights to privacy.