Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: Expert Voices
Looming budget cuts, expanded missions, greater public demand, and a changing workforce--huge challenges for today's government agency leaders. These challenges present opportunities to maximize value and do better with less. With guidance coming from many directions, how can leaders determine what works best for their agencies? What are the "game-changers" in the arena of driving value? And how can leaders expedite value optimization?
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
For the past 25 years, reforming the American healthcare system has been a national priority. As part of this effort, this Administration has incentivized the use and adoption of health information technology, primarily in two forms - promoting the meaningful use of electronic health records and creating health information exchanges to facilitate greater sharing of information. For patients, unlocking health information creates the promise of greater access, convenience, and mobility in receiving healthcare services. For providers and payers, reducing barriers to information flow is one key to improving healthcare quality and reducing costs. But this raises several critical questions: Will doctors and patients embrace electronic health records and the secure exchange of health information? How might mobile applications fundamentally transform how we conceive of the healthcare system in the future? How should healthcare professionals embrace next-generation technologies along with the need for privacy and security? What will this health information technology ecosystem look like in 10 years, and what do we need to do to plan for its success?
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services