Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Bring your own device
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , identity management , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , AFCEA , Jared Serbu
Kim Hancher, the chief information officer at the Equal Employment Opportunity Commission, will hsare her ideas on mobile device management
August 6, 2013
Tags: technology , mobile devices , mobile device management , enterprise tablets , Computer World , cloud computing , BlackBerry , information technology , mobile security , mobile strategy , Kim Hancher , EEOC , Federal Tech Talk , John Gilroy
The Equal Employment Opportunity Commission needed to find savings after its IT budget received a 15 percent reduction in 2012. Kim Hancher, the EEOC CIO, decided to reduce spending on mobile devices and instituted a BYOD policy to cut spending by almost 50 percent.
December 6, 2012
Deputy CIO Charles McClam said the Department of Agriculture is developing a policy and has awarded a mobile device management contract to figure out how best to let employees use their own smartphones and tablet devices on the agency's computer network. NASA Goddard also is creating a BYOD policy that depends on its virtual desktop infrastructure.
Michael Isman, vice president of Booz Allen Hamilton, says agencies adopting a bring-your-own- device strategy should do so as part of their larger digital strategy.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
Early-adopter agencies of the bring-your-own-device idea are blazing their own trail through the security, privacy and policy challenges of personally-owned devices on government networks.
Veteran Affairs' CIO Roger Baker pointed to concerns over cybersecurity as the reason why he's wary about agencies adopting bring-your-own-device initiatives.
Federal CIO Steven VanRoekel said the new documents met three of five action items that agency technology managers developed last winter. OMB received buy-in not only from CIOs, but CFOs, CAOs and CHCOs before finalizing the plans.
CIO Tommy Hwang said the agency is receiving more documents electronically from agencies and law firms than ever before. He also is moving the email system to the cloud and developing a BYOD policy.
May 17, 2012(Encore presentation June 28, 2012)