Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DHS
DHS will oversee and provide assistance to civilian agencies to improve how they protect their computer networks. White House cyber coordinator Schmidt says the goal of the memo is to make sure agency roles and responsibilities are clear. Schmidt also calls for more valuable public-private partnerships.
Does it measure up?
This week, the show features two speakers from the Management of Change conference, which took place in Philadelphia earlier this year.
OMB issues a fact sheet detailing successes across the government. Agencies are using fewer risky contracts and achieving more competition. One expert, however, wonders if the insourcing initiative is part of the reason for the changes.
Tags: contracting , Dan Gordon , Chuck Gherardini , John Bashista , OMB , OFPP , EPA , NNSA , Interior , DoD , Robert Burton , Venable , competition , sole source contracting , contracting reforms , acquisition workforce , insourcing , Jason Miller
The document describes how the agency protects privacy, including training and dealing with personal information. DHS tracks all privacy breaches in a secure online database.
The Department of Homeland Security is still having issues with acquisition.
Administrator Gordon says strategic sourcing is one way to ensure the government gets the lowest price and to consolidate existing contracts. Gordon also wants agencies to submit business cases for new multi-agency contracts, but doesn't commit to asking agencies to justify all types of multiple award contracts.
Tags: contracting , Dan Gordon , Steve Kempf , John Needham , Rick Gunderson , Claire McCaskill , Scott Brown , OFPP , GSA , GAO , NIH , NASA , Senate Homeland Security and Governmental Affairs , Interagency contracting , multiple award contracting , schedules , GWACs , Jason Miller
Fourteen years ago, Congress passed the landmark Clinger-Cohen Act, creating the job of chief information officer in federal agencies. How has the job changed over the years, and what do today's CIOs think of their role?
Tags: technology , chief information officer , Richard Spires , David Wennergren , DoD , Susan Swart , State Department , Joe Klimavich , NOAA , Government Executive , OMB , Clinger Cohen Act , Max Cacas
A new Inspector General audit finds FEMA failed to resolve some ongoing weaknesses. Inspectors also found a host of new vulnerabilities around cybersecurity and data backup.
As agencies try to hire hundreds of trained cybersecurity experts in the coming years, there are questions about whether that need can be met. Some observers wonder whether there really are enough cybersecurity workers.