Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Under-investment has left the US Foreign Service overstretched and under prepared. Ambassador Robert Beecroft explains some of the challenges that has left behind.
Alex Kingsbury, associate editor for national security at U.S. News & World Report
Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.
The Office of the Inspector General at the State Department examined social media use in 22 foreign embassies.
Jess Ford, the director of International Affairs and Trade Issues at the GAO, explains how State can better invest in training.
Stuart Bowen told Congress the State Department is far from ready to take over the occupation of the country from the US military. We talk to him about that conclusion.
Federal News Radio surveyed 10 agencies to find out how they are preparing for a shutdown, and how operating under a continuing resolution is affecting their operations.
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the Iranian Cyber Army.
The Open Source movement has opened a window for rapid development and implementation of technological solutions in the government space, but there are unresolved issues. State's Paul Swider tells us about a recent conference to address some of those issues.
Collaboration tools like Twitter have allowed agencies to communicate directly with constituents. For the State Department this week, the constituents have been the people and governments in the Arab world.
We get a first hand account of what it's been like to go from cruise ship vacationer to evacuee from communications consultant Fern Krauss.
James Pettit, deputy assistant secretary for the agency's Overseas Citizens Services, explains the logistics of evacuating personnel and U.S. citizens from Egypt.
Hundreds of foreigners have evacuated from Egypt, but it hasn't been easy. CNN's Bob Costantini gives us an update on the unfolding situation.
Fred Burton, a former Special Agent with the Department of State's Diplomatic Security Service, joins host Derrick Dortch for a discussion on congressional security.
January 28, 2011
Union membership has declined across the board in 2010 despite a substantial rise in public sector union workers compared to their private sector counterparts.
As the mission in Iraq winds down, a federal civilian effort increases. We get the latest details from Brig. Gen. Jeffrey Buchanan, spokesman for U.S. Forces in Iraq.
When it comes to reducing costs and wasteful spending at agencies, IT managers are being leaned on heavily to get the job done. The Navy is moving ahead with its technology efficiency and consolidation initiative by putting the brakes on spending for new servers, server upgrades and data centers. “We are reevaluating what all of [...]