Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: CSIS
Despite a veto threat a year ago, House proponents of a cyber information sharing bill say productive talks now are underway with the Obama administration. Reps. Mike Rogers and Dutch Ruppersberger re-introduced the Cyber Intelligence Sharing and Protection Act (CISPA) trying to address privacy and civil liberties concerns.
Tags: Congress , cybersecurity , Dutch Ruppersberger , Mike Rogers , House Intelligence Committee , CISPA , White House , information sharing , The Constitution Project , Privacy and civil liberties , Sharon Bradford Franklin , Jared Serbu
DoD's operations and maintenance accounts will likely be hit first if sequestration goes into effect. Unlike its procurement and research and development activities, which can continue to function on funds obligated in prior years, O&M dollars generally get spent right away. In preparation for sequestration, the Pentagon has already let go of tens of thousands of temporary hires and is drawing up a contingency plan for one-day-a-week furloughs. Deputy Secretary Ashton Carter says the unpaid furloughs would begin in April and continue through the remainder of the fiscal year if sequestration is not avoided.
Tags: DoD , sequestration , Army , Navy , DoD budget , Gordon Adams , Brookings Institution , Center for Strategic and Budgetary Assessments , Stimson Center , David Berteau , Todd Harrison , Jared Serbu
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group discuss what you can do to reduce the risk of cyber attacks at your agency.
January 1, 2013
Tags: technology , security management , cybersecurity , Karen Evans , mobile technology , KE&T Partners , Julie Anderson , Civitas Group , mobile security , duplication , cyber attacks , John Gilroy , Federal Tech Talk
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
Chief of Staff Gen. Ray Odierno said the service wants to bring more uniformed men and women into the institutional Army. He said they have relied too much on civilian employees and contractors over the last decade. Odierno said the Army also has to change the way it trains its leaders to be more adaptable.
Guy Ben-Ari, the deputy director of the Defense-Industrial Initiatives Group at CSIS, and Greg Sanders, a senior fellow with the group, joined Pentagon Solutions to discuss the latest DoD contracting trends identified in the group's annual report.
Over the past 20 years, spending on defense contracts far outstripped growth in the overall defense budget. But a new analysis from the Center for Strategic and International Studies points to an "equilibrium," or steadiness, between contract spending as a share of DoD dollars. David Berteau, the senior vice president and director of the International Security Program at the Center for Strategic and International Security, joined In Depth with Francis to discuss the think tank's annual report on defense contracting trends.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.