Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Gary Galloway
More than 80 percent of the federal systems
count on private sector critical
infrastructure to work.
Should one of the telecommunications, electricity or other providers be hacked or go down from a natural disaster, agency mission would be in peril.
Just take last summer's Derecho that impacted the Washington DC area. One agency lost their connection to the Internet for some time because of the storm even though their infrastructure was in the cloud.
Over the past decade or more, agencies have applied the lessons learned from the assortment of man-made and natural disasters that have impacted their services to keep their services running as smoothly as possible.
But with the emergence of cloud computing, virtualization, mobile computing and other technologies, what should agencies keep in mind to ensure the continuity of operations? How is the idea of COOP and disaster recovery changing? The panel, Carrying on with Continuity of Operations, will look at how agencies have implemented COOP and disaster recovery over the past decade and where they need to go next.
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.
Three people involved with The Management of Change conference next week offer some insight into what the conference is about.