Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Gary Galloway
More than 80 percent of the federal systems
count on private sector critical
infrastructure to work.
Should one of the telecommunications, electricity or other providers be hacked or go down from a natural disaster, agency mission would be in peril.
Just take last summer's Derecho that impacted the Washington DC area. One agency lost their connection to the Internet for some time because of the storm even though their infrastructure was in the cloud.
Over the past decade or more, agencies have applied the lessons learned from the assortment of man-made and natural disasters that have impacted their services to keep their services running as smoothly as possible.
But with the emergence of cloud computing, virtualization, mobile computing and other technologies, what should agencies keep in mind to ensure the continuity of operations? How is the idea of COOP and disaster recovery changing? The panel, Carrying on with Continuity of Operations, will look at how agencies have implemented COOP and disaster recovery over the past decade and where they need to go next.
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.
Three people involved with The Management of Change conference next week offer some insight into what the conference is about.