Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: AFCEA
America's Intelligence Community depends on timely, accurate information to help national leaders make important decisions every day. And yet, increasing use of drones, remote sensors, satellites and a plethora of digital data sources threatens to overwhelm analysts abilities to sort out needles of useful information in the big data haystack. In this edition of "AFCEA Answers", Mark Lowenthal from the Intelligence and Security Academy, and Lewis Shepherd with the Microsoft Institute, continue a debate started in the pages of SIGNAL Magazine on whether or not an emphasis on Big Data in the IC should be a top priority at this time.
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , identity management , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , Jared Serbu
The Defense & Security MOBILE Symposium hosted by AFCEA DC focuses on the potential that mobile and wireless technologies offer for meeting the operational mission of the military, security community and DHS, as well as for improving business operations and training. Listen to Federal News Radio's interviews with conference speakers.
When it comes to cybersecurity, one of the biggest challenges is verifying the identity of the end user, whether it's for an e-commerce site, or a secure government database. The challenge is multiplied by the explosive growth in the use of mobile devices in both the public and private sector. On this edition of AFCEA Answers, we'll look at government efforts in the realm of identity assurance with Ken Gantt, Acting Deputy Director of the Office of Biometric Identity Management (OBIM) with the Department of Homeland Security. And, we'll examine the work of the multi-institution Center for Identity Technology Research (CITeR), delving into "next-generation" solutions for identity assurance, with its director, Dr. Stephanie Schuckers, a professor at Clarkson University in Pottsdam, NY.
Organizations postponed several large conferences earlier this week after the government shutdown. More than 100 other events are scheduled in October in the Washington area, and could be in jeopardy if the partial closure of the government continues.
Treasury's Office of Financial Innovation Transformation (OFIT) issued a draft set of requirements that agencies must meet if they want to be federal shared services providers. The requirements should be finalized this fall, and a new set of providers will be in place in the coming months.
Senior uniformed Air Force leaders have agreed it's time to give more authority to the service's chief information officer. The CIO is drafting plans that will give it more say-so over planning the overall IT environment and the dollars targeted toward individual projects.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
In part two of our examination of cloud computing in the federal government, Dave McClure with the General Services Administration, and Edwin Elmore and Mark Lambdin with Cisco Systems in Washington, provide a report card on cloud computing. How are industry and government meeting the challenges of security, acquisitions and 'big data' when it comes to the cloud? And what do government and industry expect from each other when it comes to the business of cloud computing?
As recently as a decade ago, enterprise services was seen as a way to cut costs and provide more efficient data and telephone services to civilian offices. But now, with the rise of the Pentagon's Joint Information Environment, enterprise services is taking on a new role in providing tactical information advantage to warfighters in the field, and business opportunities to industry capable of providing both the hardware and software to make it happen.
Joining us to talk about it on this edition of "AFCEA Answers" is David DeVries, Deputy Chief Information Officer for Information Enterprise, Department of Defense.