Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.
Cyber threats and challenges grow every day. Successfully defending our networks requires a team approach. With this in mind, the 2013 Cyber Symposium will engage the key players, including the U.S. government, the international community, industry and academia, to discuss the development of robust cyberspace capabilities and partnerships.
DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.
In the initial round of installations, the Navy hoped to outfit 15 ships with the new standardized IT architecture. But fiscal 2013 budget problems will cut the number of ships roughly in half.
The Marine Corps will transition on Saturday to a government-owned, government-operated IT network, ending its 12-year reliance on the Navy-Marine Corps Intranet (NMCI). The Navy said it expects to award the follow-on contract to NMCI by June 30.
CIO ROUNDTABLE-Progress with IT Programs "Live from the 2013 AFCEA Homeland Security Conference" March 2013
Listen Tuesday March 5th @ 12pm
Program will discuss the following: Specific Programs That Are Making Great Progress,Top Priorities for Next 1-3 Years, Key Technology Trends, Biggest Challenges to Overcome, Biggest Opportunities for Collaboration, and Vision for The Future
Officials aim to redefine operational series codes for civilian cybersecurity workers and offer more pay for additional expertise. The Air Force would like to create an elite cadre of civilian cyber warriors.
President Obama's recent executive order directing that cyber threat information be shared more broadly with the private sector risks making the data less useful to the intelligence agencies that gather and process it. But the risk is worth the potential reward.
The fledgling effort to replace IT systems aboard 193 Navy ships, called CANES, will take longer than expected. With or without sequestration, the Navy expects eight installations scheduled for 2013 to be interrupted.