Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: AFCEA
The Homeland Security Department upgraded its Homeland Security Information Network (HSIN) last year with new security and identity management features. The growing acceptance and use of standards is making it easier for state, local, tribal government and other partners to securely access law enforcement data.
America's Intelligence Community depends on timely, accurate information to help national leaders make important decisions every day. And yet, increasing use of drones, remote sensors, satellites and a plethora of digital data sources threatens to overwhelm analysts abilities to sort out needles of useful information in the big data haystack. In this edition of "AFCEA Answers", Mark Lowenthal from the Intelligence and Security Academy, and Lewis Shepherd with the Microsoft Institute, continue a debate started in the pages of SIGNAL Magazine on whether or not an emphasis on Big Data in the IC should be a top priority at this time.
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , identity management , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , Jared Serbu
The Defense & Security MOBILE Symposium hosted by AFCEA DC focuses on the potential that mobile and wireless technologies offer for meeting the operational mission of the military, security community and DHS, as well as for improving business operations and training. Listen to Federal News Radio's interviews with conference speakers.
When it comes to cybersecurity, one of the biggest challenges is verifying the identity of the end user, whether it's for an e-commerce site, or a secure government database. The challenge is multiplied by the explosive growth in the use of mobile devices in both the public and private sector. On this edition of AFCEA Answers, we'll look at government efforts in the realm of identity assurance with Ken Gantt, Acting Deputy Director of the Office of Biometric Identity Management (OBIM) with the Department of Homeland Security. And, we'll examine the work of the multi-institution Center for Identity Technology Research (CITeR), delving into "next-generation" solutions for identity assurance, with its director, Dr. Stephanie Schuckers, a professor at Clarkson University in Pottsdam, NY.
Organizations postponed several large conferences earlier this week after the government shutdown. More than 100 other events are scheduled in October in the Washington area, and could be in jeopardy if the partial closure of the government continues.
Treasury's Office of Financial Innovation Transformation (OFIT) issued a draft set of requirements that agencies must meet if they want to be federal shared services providers. The requirements should be finalized this fall, and a new set of providers will be in place in the coming months.
Senior uniformed Air Force leaders have agreed it's time to give more authority to the service's chief information officer. The CIO is drafting plans that will give it more say-so over planning the overall IT environment and the dollars targeted toward individual projects.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
In part two of our examination of cloud computing in the federal government, Dave McClure with the General Services Administration, and Edwin Elmore and Mark Lambdin with Cisco Systems in Washington, provide a report card on cloud computing. How are industry and government meeting the challenges of security, acquisitions and 'big data' when it comes to the cloud? And what do government and industry expect from each other when it comes to the business of cloud computing?