Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: CSIS
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group discuss what you can do to reduce the risk of cyber attacks at your agency.
January 1, 2013
Tags: technology , security management , cybersecurity , Karen Evans , mobile technology , KE&T Partners , Julie Anderson , Civitas Group , mobile security , duplication , cyber attacks , John Gilroy , Federal Tech Talk
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
Chief of Staff Gen. Ray Odierno said the service wants to bring more uniformed men and women into the institutional Army. He said they have relied too much on civilian employees and contractors over the last decade. Odierno said the Army also has to change the way it trains its leaders to be more adaptable.
Guy Ben-Ari, the deputy director of the Defense-Industrial Initiatives Group at CSIS, and Greg Sanders, a senior fellow with the group, joined Pentagon Solutions to discuss the latest DoD contracting trends identified in the group's annual report.
Over the past 20 years, spending on defense contracts far outstripped growth in the overall defense budget. But a new analysis from the Center for Strategic and International Studies points to an "equilibrium," or steadiness, between contract spending as a share of DoD dollars. David Berteau, the senior vice president and director of the International Security Program at the Center for Strategic and International Security, joined In Depth with Francis to discuss the think tank's annual report on defense contracting trends.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Lawmakers have about 23 real work days left before the end of the fiscal year to pass USPS reform, comprehensive cyber, DoD authorization and all the 2013 spending bills. Experts hold out little hope even after the passage of the FDA bill and the expected approval of the highway legislation.
Tags: Congress , cybersecurity , USPS , postal reform bill , DoD , DoD authorization bill , appropriations bill , Tevi Troy , Hudson Institute , Trey Hodgkins , TechAmerica , James Lewis , Jason Miller
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.
Lt. Gen. George J. Flyn, the Joint Staff's director of Joint Force Development, delivered the keynote address at the Center for Strategic and International Studies' conference "Challenges to Access and the U.S. Response: The Joint Operational Access Concept."