Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DISA
A review of audit practices at the military's IT agency finds significant deficiencies in meeting governmentwide "yellow book" auditing standards. DISA agreed with the inspector general's findings and laid out four steps toward improvement.
Instead of using a lengthy security technical implementation guide approval process to decide which tablets and smartphones will be allowed to use its network, the Defense Information Systems Agency wants to put the ball in the vendors' court.
Are you eligible for a buyout? Benefits expert Tammy Flanagan breaks down the requirements. Plus, a new report on PTSD finds 1 in 5 servicemembers may have it and some are not getting help.
The Defense Department has laid out an ambitious cloud computing strategy that includes building up and transitioning to an DoD-wide enterprise cloud environment as well leveraging a broad range of commercial services. DoD Chief Information Officer Teri Takai released the four-step strategy Wednesday. The strategy includes steps for winnowing down the number of data centers to a few "core" elements as well as phasing out dedicated infrastructures in favor of shareable, virtualized ones.
Defense leaders say the Pentagon should skip buying IT for some major systems until contractors finish production. Many big projects take years to complete, meaning the technology inside becomes outdated by project completion.
CWTSatoTravel objected to the $1.4 billion E- Travel award going to Concur Technologies. SAIC protested DISA's $4.6 billion award for the Global Information Grid management services to Lockheed Martin. Both protestors are the incumbent contractors.
Lockheed Martin, the federal government's largest contractor landed up to $1.9 billion worth of work Friday in a deal to operate Defense Department networks across the globe.
May 22nd at 12pm
Program will discuss Key Initiatives Around "Cloud Computing" in Government, Key Benefits Associated with Cloud Computing, Barriers or Contraints to still overcome, How to Address Security Concerns in a Cloud Computing Strategy, Private vs Public Clouds, A Future Vision for the next 1-2 Years in Cloud Computing
DISA has released a request for information that says the single network would replace three existing ones. By 2020, it says the wired and wireless network would provide bandwidth on demand where none is available now.
The Army and DISA will release a broad agency announcement this summer seeking third party software to secure smartphones and tablet computers. The Marine Corps is looking at host of different possibilities to secure mobile devices, including a process to verify the software code in apps.
Tags: technology , cybersecurity , Army , Marine Corps , Defense , Stephen Smith , Ray Letteer , Howard Schmidt , Emma Garrison-Alexander , TSA , White House , mobile computing , McAfee , Jason Miller