Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DoD
A new call center, staffed by professionals trained to handle grieving callers, is among the first technology upgrades the Army has made in the aftermath of a management scandal at Arlington National Cemetery last year. Phase two will involve tackling the massive challenge of digitizing the cemetery's paper records.
March 23rd, 2011 at 11 AM
Criminal enterprises operating globally - so-called "Transnational Criminal Organizations" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
The idea is to treat cyberspace as a domain within DoD and employ active cyber defenses and other new defense approaches.
The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.
The Army and Marine Corps are both in the early phases of deploying logistics accountability systems that will replace a collection of disconnected, stovepiped IT systems and processes that have grown up since the 1960s. Though the systems share the same objective, they were made by different vendors, prompting questions from one member of Congress.
Tags: Congress , management , Army , Marine Corps , Claire McCaskill , financial management , DoD budget , Enterprise Resource Planning , Drew Dwyer , James Amos , Senate Armed Services Committee , Jared Serbu , DoD Report
Al Qaida in Iraq has claimed responsibility for last week's car bomb attack on an Iraqi army unit that killed at least eight soldiers The bomb targeted an army headquarters in the northern area of Diyala province. 30 others were wounded when it exploded last Monday. Security forces stopped a second attack and defused a car bomb parked at the scene. The attacks in Iraq are a daily occurrence as insurgence continue to attack Iraqi forces knowing that U.S. troops are leaving Iraq totally at the end of this year.
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Tags: technology , management , Vivek Kundra , OMB , GSA , NASA , DHS , U.S. CERT , NIST , cybersecurity , FISMA , Continuous monitoring , encryption , HSPD-12 , Cyber Workforce , CyberStat , Cyberscope , supply chain , Jason Miller
Susan Lawrence, the Army's newly-appointed Chief Information Officer members of the IT and communications industry that the service is focused on creating an end-to-end IT infrastructure, eliminating structures that required soldiers to train and live on one network, and deploy on another.
Shay Assad, director of the office of Defense Procurement and Acquisition Policy, told industry professionals Thursday that DoD would provide them with a clearer picture of what the Pentagon wants when it issues solicitations to industry. Past acquisition processes, he said, had forced vendors to guess what factors DoD thought were truly important.
Retired Air Force Colonel Chet Richards says DoD has missed the mark in several of its big decisions during recent years. He says defense leaders are making choices that leave people scratching their heads.