Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: DHS
P2P networks a treasure trove of leaked health care data, study finds; DHS contracts immixGroup to support C3
DHS, VA say they need their own multiple award contracts because they want vendors who are familiar with their processes and requirements. Others say agencies want the "glory" of running large procurements and are unhappy with GSA's fees. GSA is trying to address the perception of poor customer service as a way to bring more agencies into the fold.
Tags: contracting , Ed O'Hare , Soraya Correa , Iris Cooper , Martha Johnson , GSA , VA , DoD , Jim Williams , Alan Chvotkin , Professional Services Council , Multiple award contracts , GWACs , Alliant , T4 , EAGLE , Ed O
Many say for the government to secure their own networks, it must work more closely with the private sector.
The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.
One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.
Director of the Office of Procurement Operations at the Homeland Security Department, Soraya Correa has 28 years of experience in procurement, federal assistance, and acquisitions management... and now, an Acquisition Excellence Award!
The agency is working with different industry sectors to improve how and the kinds of IT security information that flows in both directions. DHS has a pilot with DoD and financial services companies to exchange threat and malicious activity from their networks. DHS also has installed Einstein 2 software on 12 agency networks to improve how they recognize risks.
Tags: technology , Greg Shaffer , Anna Eshoo , John Denning , DoD , GAO , Computer and Communications Industry Association , Financial Services Information Sharing and Analysi , cybersecurity , Einstein , information sharing , Jason Miller
WFED's Jason Miller reports.
The system worked, says Rich Cooper, but resting on laurels is worst possible action.
Agency plans moving forward with re-compete despite GSA's attempt to bring Eagle under the Alliant GWAC. DHS spent almost $2 billion on IT services in 2009 and more than $8 billion overall through the vehicle.
Computer breaches starting to level off, GISLA awards open for nominations
Legislation authorizes critical management functions and programs within S&T, including the Securing the Cities program and authorizing the National Urban Security Technology Laboratory (NUSTL). Rep. Yvette Clarke explains.