Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
The Department of Defense is in the midst of a large-scale revamping of its information infrastructure. The Joint Information Environment (JIE) promises to facilitate information sharing among the military services, other government stakeholders, and coalition partners. And it will do so while consolidating resources at a time of budgetary challenges. In this edition of AFCEA Answers, DOD Deputy CIO David DeVries offers a progress report on the JIE, and hints at how they will inevitably measure success. Also: a preview of the upcoming AFCEA JIE Mission Partner Symposium, May 12 - 14 in Baltimore.
For the U.S. Navy, Information Dominance has become just as important a pillar in its warfighting strategy as fast planes and sturdy warships. This week on AFCEA Answers, our guest, Vice Admiral Ted Branch, USN, the Navy's N2/N6 and Director of Naval Intelligence, explains how industry can benefit from understanding the Navy's priorities when it comes to Information Dominance. He will also explain how he manages to juggle four different jobs that are all related to the mission of Information Dominance.
At a time when spending reductions, winding down two decade-long wars, and new threats from new adversaries is the "new normal"; one of the Defense Department's challenges is managing amidst all this change. In this edition of "AFCEA Answers," we'll talk to Kevin Scheid, Acting Deputy Chief Management Officer with DOD about new initiatives to manage the largest federal agency. Hear how a shift in responsibility for business system IT has changed the job of one top DOD official. Plus: Defense Secretary Chuck Hagel, working on a roadmap to improve management of the Department of Defense.
Whether it's network bandwidth, acquisitions, cybersecurity, or the Joint Information Environment, Rear Admiral Bob Day, Chief Information Officer of the U.S. Coast Guard has been involved in answering the service's information technology challenges. In this edition of "AFCEA Answers", Adm. Day, who also serves as Commander of Coast Guard Cyber Command, reflects on his 5 years as CIO, and his 34 years of military service as he prepares to retire this summer. He considers IT to be a "mission enabler" for the Coast Guard, and points to the recently deployed "Rescue 21" shipboard communications system, which he says, "is taking the ‘search' out of search-and-rescue."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
By September, the Navy anticipates it will have retaken full ownership of its main IT network after having outsourced it a decade earlier. The service says it wants to find ways to bring innovation into NMCI, but vendors will have to meet some checkpoints along the way.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.