Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: David Heyman
On the In Depth show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
The Homeland Security Department is taking a two-pronged approach to protecting the federal supply chain. The first addresses the DHS mission cargo crossing into the U.S. The second is an interagency effort to ensure the government is working together on investigations. DHS said seizures of counterfeit goods at the border increased by 20 percent in 2011.
The Department of Homeland Security has completed the second phase of a long-term planning and review program. The so-called "Bottom-up Review" picks up where the ground-breaking Quadrennial Homeland Security Review left off earlier this year, and paves the way for the possibility of major changes in DHS programs to better fit the agency's mission.
For the first time since the founding of the agency, the Department of Homeland Security is getting an opportunity for some introspection and a look at whether its programs and priorities are "on mission." The Quadrennial Homeland Security Review, unlike other agency documents, was written and developed using a variation of popular web 2.0 collaboration tools.
Multiple hearings focus on figuring out what led to the Dec. 25 attempted terrorist attack. FBI, DHS, State offer details on what changes each made in the last month.
Tags: technology , management , Robert Mueller , Patrick Kennedy , Joseph Lieberman , Patrick Leahy , DHS , FBI , State , Judiciary Committee , Homeland Security and Governmental Affairs Committ , information sharing , Terrorist watch list , No fly list