Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: CSIS
Reworked guidance is the first update to key Defense Department instruction since 2008. Internal attempt to streamline the system is leading department officials to seek legislative changes to make the military acquisition process less complex.
Pentagon leaders have spent the past two years warning Congress that sequestration would severely hamper the ability to deploy military forces to contingencies around the world. With no apparent relief in sight from the cuts, Defense Secretary Chuck Hagel said it's time to start thinking about making the best of a bad situation.
Federal spending on services contracts continued a slow downturn last year, according to a new analysis from the Center for Strategic and International Studies. Contract spending on services fell 7 percent -- from $332 billion to $308 billion — between 2011 and 2012. And the downward trend is likely to continue, given budget constraints that are likely to intensify in the coming years, according to David Berteau, senior vice president at the Center for Strategic and International Studies.
The Pentagon will begin tracking how much time its acquisition managers spend performing and responding to oversight in an effort to remove "non-value-added" processes from the procurement system.
Despite a veto threat a year ago, House proponents of a cyber information sharing bill say productive talks now are underway with the Obama administration. Reps. Mike Rogers and Dutch Ruppersberger re-introduced the Cyber Intelligence Sharing and Protection Act (CISPA) trying to address privacy and civil liberties concerns.
Tags: Congress , cybersecurity , Dutch Ruppersberger , Mike Rogers , House Intelligence Committee , CISPA , White House , information sharing , The Constitution Project , Privacy and civil liberties , Sharon Bradford Franklin , Jared Serbu
DoD's operations and maintenance accounts will likely be hit first if sequestration goes into effect. Unlike its procurement and research and development activities, which can continue to function on funds obligated in prior years, O&M dollars generally get spent right away. In preparation for sequestration, the Pentagon has already let go of tens of thousands of temporary hires and is drawing up a contingency plan for one-day-a-week furloughs. Deputy Secretary Ashton Carter says the unpaid furloughs would begin in April and continue through the remainder of the fiscal year if sequestration is not avoided.
Tags: DoD , sequestration , Army , Navy , DoD budget , Gordon Adams , Brookings Institution , Center for Strategic and Budgetary Assessments , Stimson Center , David Berteau , Todd Harrison , Jared Serbu
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group discuss what you can do to reduce the risk of cyber attacks at your agency.
January 1, 2013
Tags: technology , security management , cybersecurity , Karen Evans , mobile technology , KE&T Partners , Julie Anderson , Civitas Group , mobile security , duplication , cyber attacks , John Gilroy , Federal Tech Talk
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.