Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
The Defense & Security MOBILE Symposium hosted by AFCEA DC focuses on the potential that mobile and wireless technologies offer for meeting the operational mission of the military, security community and DHS, as well as for improving business operations and training. Listen to Federal News Radio's interviews with conference speakers.
When it comes to cybersecurity, one of the biggest challenges is verifying the identity of the end user, whether it's for an e-commerce site, or a secure government database. The challenge is multiplied by the explosive growth in the use of mobile devices in both the public and private sector. On this edition of AFCEA Answers, we'll look at government efforts in the realm of identity assurance with Ken Gantt, Acting Deputy Director of the Office of Biometric Identity Management (OBIM) with the Department of Homeland Security. And, we'll examine the work of the multi-institution Center for Identity Technology Research (CITeR), delving into "next-generation" solutions for identity assurance, with its director, Dr. Stephanie Schuckers, a professor at Clarkson University in Pottsdam, NY.
Organizations postponed several large conferences earlier this week after the government shutdown. More than 100 other events are scheduled in October in the Washington area, and could be in jeopardy if the partial closure of the government continues.
Treasury's Office of Financial Innovation Transformation (OFIT) issued a draft set of requirements that agencies must meet if they want to be federal shared services providers. The requirements should be finalized this fall, and a new set of providers will be in place in the coming months.
Senior uniformed Air Force leaders have agreed it's time to give more authority to the service's chief information officer. The CIO is drafting plans that will give it more say-so over planning the overall IT environment and the dollars targeted toward individual projects.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
In part two of our examination of cloud computing in the federal government, Dave McClure with the General Services Administration, and Edwin Elmore and Mark Lambdin with Cisco Systems in Washington, provide a report card on cloud computing. How are industry and government meeting the challenges of security, acquisitions and 'big data' when it comes to the cloud? And what do government and industry expect from each other when it comes to the business of cloud computing?
The FBI hopes a new portal, iGuardian, will enable the FBI to help companies protect themselves against malware by creating a repository of cybersecurity breaches.
Tags: industry , cybersecurity , FBI , iGuardian , Rick McFeely , technology , information sharing , Rick Howard , TASC , Troy Mattern , Software Engineering Institute , Melissa Dawkins , Jason Miller
This AFCEA Answers episode tackles issues surrounding mobility for the government and industry community. Find out what Mobility means to Lt Gen Ronnie Hawkins, Jr., USAF, Director, DISA, as he discusses this key disruptive technology with industry experts.
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.