Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: DHS
Department of Homeland Security officials say 100 percent of passengers traveling in the U.S. and its territories are now being checked against terrorist watchlists through the Transportation Security Administration's Secure Flight program - a major step in fulfilling a key 9/11 Commission recommendation. Secure Flight enables TSA to screen passengers directly against government watchlists using passenger's names, their date of birth, and gender before a boarding pass is issued. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists. Officials say 99 percent of passengers will be cleared by Secure Flight to print boarding passes at home by providing their date of birth, gender and name as it appears on the government ID they plan to use when traveling.
Agencies recycled more than 51,000 pounds of electronics, purchases more than 58,000 hardware that met the green standards and saved the government more than $11 million.
Susan Zeleniak of Verizon Federal explains that Networx will benefit all agencies and vastly improve the way things work -- once agencies make the move, that is.
Today we get the perspective of former OFPP administrator Steve Kelman.
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
One the world's largest supercomputers is being used to forecast, in 3D, how BP's massive Gulf of Mexico oil spill will affect coastal areas. Blue Waters Program director Irene Qualters explains how it works.
Bill would require Defense to explore new cybersecurity buys and tools, First governmentwide cyber provider approved
AT&T receives an authority to operate its cybersecurity services under the Networx telecommunications contract. Agencies now can purchase these services to meet the Trusted Internet Connections requirements.
Tags: technology , contracting , OMB , GSA , FTC , EPA , Treasury , AT&T , Qwest , Sprint , Verizon , Jeff Mohan , Tom McMahon , Bill White , Networx , telecommunications , cybersecurity , TIC , MTIPS , Jason Miller
In speech after speech, officials talk about the need for government and industry to work together to solve cybersecurity challenges. But for the past five years, a government-industry partnership has actually been making good on the promise of collaboration in the cybersecurity arena.
From NSA to the TSA -- CIO Emma Garrison-Alexander explains her experiences this week on the show.
May 27, 2010