Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: David Heyman
On the In Depth show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
The Homeland Security Department is taking a two-pronged approach to protecting the federal supply chain. The first addresses the DHS mission cargo crossing into the U.S. The second is an interagency effort to ensure the government is working together on investigations. DHS said seizures of counterfeit goods at the border increased by 20 percent in 2011.
The Department of Homeland Security has completed the second phase of a long-term planning and review program. The so-called "Bottom-up Review" picks up where the ground-breaking Quadrennial Homeland Security Review left off earlier this year, and paves the way for the possibility of major changes in DHS programs to better fit the agency's mission.
For the first time since the founding of the agency, the Department of Homeland Security is getting an opportunity for some introspection and a look at whether its programs and priorities are "on mission." The Quadrennial Homeland Security Review, unlike other agency documents, was written and developed using a variation of popular web 2.0 collaboration tools.
Multiple hearings focus on figuring out what led to the Dec. 25 attempted terrorist attack. FBI, DHS, State offer details on what changes each made in the last month.
Tags: technology , management , Robert Mueller , Patrick Kennedy , Joseph Lieberman , Patrick Leahy , DHS , FBI , State , Judiciary Committee , Homeland Security and Governmental Affairs Committ , information sharing , Terrorist watch list , No fly list