Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
Experts offer advice to small firms at the AFCEA NOVA event Tuesday to prosper in the federal marketplace.
The Postal Service will kick off its pilot to provide identity management services in the cloud in early 2014. The IRS and DHS also are pursuing complimentary initiatives to authorize and authenticate users.
The Air Force's Service Development and Delivery Process aims to deliver data hosting, enterprise management, security and other IT functions as standards-based services to be used by the entire organization.
The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Most people don't think about critical infrastructure until the power goes out, or fresh drinking water doesn't flow from the tap. But the federal government has mapped out a plan with the help of industry, to safeguard the nation's critical infrastructure. On this edition of "AFCEA Answers", we'll discuss the nuances of the newly-released National Infrastructure Protection Plan with Suzanne Spaulding, the acting Department of Homeland Security Undersecretary for the National Protection and Programs Directorate; and Jill Singer, a partner with Deep Water Point consulting in McLean, Virginia.
As we begin the new year, we thought this would be a good time to recap some of our conversations from the first six months of "AFCEA Answers" broadcasts. From cloud to tactical radios, mobility to cybersecurity, and even a friendly debate about big data in the intelligence community, we'll have it all for you. Including top guests from government, industry and academia.
The Homeland Security Department upgraded its Homeland Security Information Network (HSIN) last year with new security and identity management features. The growing acceptance and use of standards is making it easier for state, local, tribal government and other partners to securely access law enforcement data.
America's Intelligence Community depends on timely, accurate information to help national leaders make important decisions every day. And yet, increasing use of drones, remote sensors, satellites and a plethora of digital data sources threatens to overwhelm analysts abilities to sort out needles of useful information in the big data haystack. In this edition of "AFCEA Answers", Mark Lowenthal from the Intelligence and Security Academy, and Lewis Shepherd with the Microsoft Institute, continue a debate started in the pages of SIGNAL Magazine on whether or not an emphasis on Big Data in the IC should be a top priority at this time.
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , identity management , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , Jared Serbu