Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: AFCEA
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The Department of Defense is in the midst of a large-scale revamping of its information infrastructure. The Joint Information Environment (JIE) promises to facilitate information sharing among the military services, other government stakeholders, and coalition partners. And it will do so while consolidating resources at a time of budgetary challenges. In this edition of AFCEA Answers, DOD Deputy CIO David DeVries offers a progress report on the JIE, and hints at how they will inevitably measure success. Also: a preview of the upcoming AFCEA JIE Mission Partner Symposium, May 12 - 14 in Baltimore.
For the U.S. Navy, Information Dominance has become just as important a pillar in its warfighting strategy as fast planes and sturdy warships. This week on AFCEA Answers, our guest, Vice Admiral Ted Branch, USN, the Navy's N2/N6 and Director of Naval Intelligence, explains how industry can benefit from understanding the Navy's priorities when it comes to Information Dominance. He will also explain how he manages to juggle four different jobs that are all related to the mission of Information Dominance.
At a time when spending reductions, winding down two decade-long wars, and new threats from new adversaries is the "new normal"; one of the Defense Department's challenges is managing amidst all this change. In this edition of "AFCEA Answers," we'll talk to Kevin Scheid, Acting Deputy Chief Management Officer with DOD about new initiatives to manage the largest federal agency. Hear how a shift in responsibility for business system IT has changed the job of one top DOD official. Plus: Defense Secretary Chuck Hagel, working on a roadmap to improve management of the Department of Defense.
Whether it's network bandwidth, acquisitions, cybersecurity, or the Joint Information Environment, Rear Admiral Bob Day, Chief Information Officer of the U.S. Coast Guard has been involved in answering the service's information technology challenges. In this edition of "AFCEA Answers", Adm. Day, who also serves as Commander of Coast Guard Cyber Command, reflects on his 5 years as CIO, and his 34 years of military service as he prepares to retire this summer. He considers IT to be a "mission enabler" for the Coast Guard, and points to the recently deployed "Rescue 21" shipboard communications system, which he says, "is taking the ‘search' out of search-and-rescue."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
By September, the Navy anticipates it will have retaken full ownership of its main IT network after having outsourced it a decade earlier. The service says it wants to find ways to bring innovation into NMCI, but vendors will have to meet some checkpoints along the way.