Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Looming budget cuts, expanded missions, greater public demand, and a changing workforce--huge challenges for today's government agency leaders. These challenges present opportunities to maximize value and do better with less. With guidance coming from many directions, how can leaders determine what works best for their agencies? What are the "game-changers" in the arena of driving value? And how can leaders expedite value optimization?
Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" — sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
For the past 25 years, reforming the American healthcare system has been a national priority. As part of this effort, this Administration has incentivized the use and adoption of health information technology, primarily in two forms - promoting the meaningful use of electronic health records and creating health information exchanges to facilitate greater sharing of information. For patients, unlocking health information creates the promise of greater access, convenience, and mobility in receiving healthcare services. For providers and payers, reducing barriers to information flow is one key to improving healthcare quality and reducing costs. But this raises several critical questions: Will doctors and patients embrace electronic health records and the secure exchange of health information? How might mobile applications fundamentally transform how we conceive of the healthcare system in the future? How should healthcare professionals embrace next-generation technologies along with the need for privacy and security? What will this health information technology ecosystem look like in 10 years, and what do we need to do to plan for its success?
The cyber revolution is just the latest in a series of waves of ‘creative destruction' that arise when disruptive technologies, new organizational models, and innovative processes converge to spawn new sources of national power. Throughout history, nations that successfully harnessed revolutionary technologies and mastered new industries emerged as global powers on the international stage, strengthening their military power, transforming their economies, and enriching their societies. Cyber technologies hold the same promise, but also raise several critical questions: which nations will emerge as the leading cyber powers of the 21st century? What will be the primary sources of their comparative cyber power - military, economic, or cultural? How significant will be the roles of non-state actors (e.g., criminal syndicates, terrorist groups, multinational corporations, non-governmental organizations) in the future cyber balance of power? Finally, what should the role of the US Government be as this new balance of power emerges?
October 25th, 2011 at 12 PM
A distinguished panel of top experts from government and industry, will explore market incentives that may or may not currently exist to stimulate greater corporate investment in cybersecurity protection measures. Such business drivers may include the consideration of relating proactive cybersecurity activity to a favorable valuation of company performance, liability protection measures such as insurance coverage for cyber vulnerabilities, or statutory liability protection. The panelists will explore the likelihood that these or other market incentives may emerge across industry and government to enhance our collective defense against sophisticated cyber threats.
Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. The firm provides services primarily to the US government, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy, organization, engineering, operations, technology, and analytics. To learn more, visit www.boozallen.com