Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Booz Allen Distinguished Speaker Series
April 21st, 2011 at 11 AM
In the midst of challenging economic circumstances, looming budget constraints, and compliance requirements with recent Executive Orders and policy directives, U.S. government agencies are under increased pressure to employ sustainability practices. Understanding the importance of sustainable efficiency in operations and the impact that the use of natural resources has on both our environment and our well-being as a society is paramount. Listen to "Beyond Green: Making Sustainability Sustainable" as part of the Booz Allen Hamilton Expert Voices panel series, featuring sustainability experts from across government to learn more.
Tags: technology ,
March 23rd, 2011 at 11 AM
Criminal enterprises operating globally - so-called "Transnational Criminal Organizations" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
February 23rd, 2011 at 11 AM
As cybersecurity threats loom, the Federal government's demand for cyber talent is expected to far exceed the nation's supply of qualified professionals, and its ability to compete with the private sector for that increasingly scarce talent is challenged by an overly complex hiring process, pay freezes, and little agreement on the skills necessary to do the job. Given the direct tie of cybersecurity to national and economic security, our government has no choice but to engage with the best, and brightest, thinkers and practitioners in this arena. How can agencies cope in this difficult environment? How can they either develop or access a top-notch pool of cyber professionals, and prepare the very best of those professionals to lead? These are difficult questions, but they are vital to our national cybersecurity; the cyber 'talent gap' poses a serious threat to America's position as a global power, making it necessary for human capital and cyber experts across government agencies to come together to help the close that gap.
February 8th, 2011 at Noon
Today's cybersecurity threat continues to evolve into a broad and sophisticated range of adversaries with the skills, resources, patience and motivation to accomplish their goal. Whether it is the theft of intellectual property, state secrets, or the disruption/destruction of critical systems and infrastructure that power our economy and ensure our National security, our Nation is at risk. America's cybersecurity against the Advanced Persistent Threat depends on Information Technology as never before. However, it is more than a technology issue. Cybersecurity requires an integrated approach across the full spectrum of people, process and technology to leverage and provide a way of thinking and action to address the issues. The threat to our National economic prosperity and cybersecurity has never been greater and is advancing at a rapid pace in its persistence every day. The goal of this discussion is to explore how the threat has evolved, what the implications are for business leaders, government officials, and our society, and an approach to address this growing challenge.
November 17th, 2010 at 11:00AM
The Internet is more than just a technology. It is a domain—similar to the domains of land, air, sea and space, but with its own distinct challenges. The cyber domain has national and international dimensions that include industry, trade, intellectual property, security, technology, culture, policy, and diplomacy. It includes all parts of the converged network, from computer networks to satellite communications, and is not bound by international borders. How can the United States shape the global cyber landscape to promote U.S. economic interests, and develop a cyber domain that considers transparency, accessibility, security, and privacy? Cyber 2020: the Future of the Internet, is part of the Booz Allen Hamilton Expert Voices panel series, moderated by Executive Vice President Mike McConnell and featuring top government and commercial experts.
October 20th, 2010 at 11 AM
The application of knowledge discovery within the cloud is immensely powerful, but not inbuilt. We are collectively moving past the question of "what is cloud computing", and swiftly moving towards "how does the cloud enable advanced analysis against massive volumes of data?" With industry and government leveraging multiple clouds, how do we successfully share and search large collections of data across systems, departments, and geographies? Organizations will continue to discuss and better understand the analytic power and economies of cloud computing, in the sense of data storage, sharing, and management; but we are quickly discovering that creating knowledge from data is more than just a discussion of technology. It's a discussion of what can be accomplished when massive data and cloud computing efficiencies combine to make advanced analysis and innovation possible.
Tags: technology , cloud , cloud computing , Michael Byrne , Jeff Jonas , David Mihelcic , DISA , Chris Nissen , Mike Olson , Cloudera , MITRE , IBM , FCC , big data , Massive Data , data management , analytics , Chris Kelly , data models , IT
Thursday, March 24th, 2010 at 11:00am
Identity and Cyber Security will play a critical role in building and managing a Smart Energy Grid. More secure and reliable access based on known and verifiable Identity will provide greater efficiency, ease of use, and security. With this decentralization, more complex systems of access management will be needed to permit authorized people the ability manage their areas of responsibility, to provide the frameworks necessary to create trust, to verify information, and to allow greater consumer participation in electrical services.
Tags: technology , identity , cyber security , Smart Energy Grid , National Institute of Standards and Technology , National Energy Technology Laboratory , Tennessee Valley Authority , Software Engineering Institute , George Arnold , Steve Bossart , James Sample , Bill Wilson
Wednesday, November 11th, 2009 at 2:05pm
Identity Theft is a multifaceted problem that has grown to epidemic proportions with the development of the internet and of the on-line economy.
Tags: technology , Booz Allen Hamilton , Kathleen Walter , IRS , Richard Power , CyLab , Carnegie Mellon University , Calivin Sneed , Blue Cross Blue Shield Association , Kennethe Jenkins , US Secret Service , cyber crime , identity theft
Thursday, December 17th, 2009 at 2:05pm
In the growing on-line world of quick and unmonitored transactions and communications, virtual identities have become common elements of people's daily lives creating limitless opportunities for criminals to recruit, launder their money, and communicate under the cloak of anonymity. A panel of leading government experts discuss the way that our adversaries use these systems and how organizations can better prepare for the threats they are facing. From a commercial, law enforcement and security perspective, panelists will explain the scope of the problems and the potential benefits that can be derived from new social media
Wednesday, October 14th, 2009 at 2:05pm
Biometric technology has proven to be an effective means to identify known and suspected individuals across our Law Enforcement, Homeland Security, Defense and Consular mission areas. As biometric capabilities are now extending to enable Identity documents and travel permits, the promise of more trustworthy Identity credentials, ease of travel, and better enforcement of border controls is greater than ever.