Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
Whether it's network bandwidth, acquisitions, cybersecurity, or the Joint Information Environment, Rear Admiral Bob Day, Chief Information Officer of the U.S. Coast Guard has been involved in answering the service's information technology challenges. In this edition of "AFCEA Answers", Adm. Day, who also serves as Commander of Coast Guard Cyber Command, reflects on his 5 years as CIO, and his 34 years of military service as he prepares to retire this summer. He considers IT to be a "mission enabler" for the Coast Guard, and points to the recently deployed "Rescue 21" shipboard communications system, which he says, "is taking the ‘search' out of search-and-rescue."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.
By September, the Navy anticipates it will have retaken full ownership of its main IT network after having outsourced it a decade earlier. The service says it wants to find ways to bring innovation into NMCI, but vendors will have to meet some checkpoints along the way.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.