Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: AFCEA
The department is creating and trying out a universal curriculum for five foundational cyber roles in 2013. DISA is leading the effort and will add new roles next year as it refines the training. The agency says it is doing all it can to synchronize its training not just across DoD, but across the entire federal government in line with the National Initiative for Cybersecurity Education (NICE).
A new process promises more advance word on what the Pentagon wants from its military services, but demands they comply with common architectures. DoD said it is learning from development mistakes of the past.
Dr. Andrew Ritcheson of DRC spoke the to Federal Drive with Tom Temin and Emily Kopp about what medical professionals have learned from 10 years of war about treating traumatic brain injuries.
The Defense Information Systems Agency sees itself as a safety valve for increasing pressure on military services' IT budgets. At a meeting of CIOs last week, DISA told the military services they could offload commodity IT services to their data centers.
Departments face challenges with contracting, hardware and policies, two years after OMB included agile development in its 25-point IT reform plan. The approach aims to make development more effective and efficient, but the switch itself has been far from agile.
Tags: technology , agile development , Shawn Kingsberry , Vivek Kundra , Thomas Sasala , Mark Schwartz , 25-point IT reform plan , Ruben Gomez , Recovery Board , Citizen and Immigration Services , Army IT agency
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
Former AFCEA Central Maryland presidents Chuck Taylor and Jerry Schepers will talk about the organization and its activities.
May 21, 2012
Competition, reliance on commercial technology drove down prices for IT consolidation on ships, Navy official says. The service still is figuring out how to integrate CANES with its NGEN shore-based system. The RFP for NGEN is expected any day.
The service will use both penalties and incentives to get their program offices and large businesses to award more prime and subcontracts to small firms. The Air Force issued a new small business improvement plan that details three goals to increase both the percentage of contracts and dollars going to small companies.
March 6th at 12pm
Program will discuss the Progress Report on Information Sharing, Top Priorities for Secure Information Sharing, Key Challenges or Barriers to still overcome,Identifying the Type of Information Needed to Share, and A Vision for The Future