Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DoD
By now you've asked yourself how did it happen? Navy seal snipers shot three pirates to death in the dark of night, at a considerable distance and two of rounds that killed the pirates actually penetrated a surface they could not see through. Or could they? Aside from the deadly accuracy from long range that they practice, today's sophisticated military weaponry and night-time visual aids give them a distinct advantage. One source said this type of strikes happen all the time, we just don't hear about them.
Dropped calls are a pain, but in a warzone it could lead to injury and death. The Defense Advanced Research Projects Agency program is working on a system that prevents disruptions in communication signals, and when they do occur, ensures the message doesn't disappear into never-never-land. The Disruption Tolerant Networking program was launched by DARPA three years ago to eliminate dropped messages that occur due to interference in the communication path, explained Preston Marshall, the program manager.
What do fluorescent rodent feces, mosquito repellant and flytraps have to do with national defense? Researchers in the Pentagon's Deployed Warfighter Protection Research Program focused on all of those pest-fighting innovations last week at the American Mosquito Control Association convention Some 800 scientists and insect control experts attended the event. Their attitude is that disease-carrying flies, mosquitoes and other bugs are all enemies of the U.S. Warfighter.
DoD announces $52.5 million in grants
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.
The role of the chief information officer continues to evolve under the Obama administration. Today's federal CIOs are expected not only to drive efficiency, transparency and strengthen information and network security, but also to implement the best technologies and practices to establish and maintain relationships with citizens.
CIOs face additional pressure from the conflicting objectives of their mission. Among them: How does one balance the demand for immediate, transparent access to information while maintaining security and privacy? How does one reduce IT spending while improving services? What is the role of the CIO within the agency and how does one operationalize it?
We'll ask today's panelists to share their views on how to meet these challenges as well as their priorities for the next year. We'll also ask them to share how they are meeting the demands of both the public and the Obama administration while serving as agents of change.
Tags: technology , Federal CIOs Drive High Performance in IT , CIO Panel , Accenture , Obama , CIO , transparency , IT , Tom Temin , Federal Drive , Federal Security Spotlight , David M. Wennergren , Michael Duffy , Treasury , Robert J. Carey , Navy