Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: HSPD-12
Federal News Radio's Jason Miller offers his top stories of 2011 and predictions for 2012.
Tags: technology , acquisition , 2011 and Beyond , Jason Miller , Dan Gordon , cybersecurity , acquisition workforce , shared services , cloud computing , mobile , open government , identity management , NSTIC , E-Government Fund
Randy Vanderhoof, the executive director of the alliance, joined the Federal Drive with Tom Temin and Amy Morris to discuss how the use of smart cards for identity and access are driving commercial security identity credentials.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Tags: technology , management , cybersecurity , Howard Schmidt , Jacob Olcott , OMB , DHS , cyber coordinator , TIC , secure identity cards , continuous monitoring , Information Security and Privacy Advisory Board , Jason Miller , CyberStat , Good Harbor Consulting
Watch or listen to this program on demand below
Originally Aired November 2nd @ 3:05pm
Tags: technology , identity management , Judy Spencer , GSA , Mike Butler , OSD , carol bales , OMB , barbara symonds , IRS , venkatapatni puvvada , Unisys , Gordon Hanah , Bearing Point , Jim Flyzik , Tom Trezza
Originally Aired January 26th at 3:05pm
Tags: technology , identity management , Jim Flyzik , Karen Evans , OMB , Scott Hastings , US-VISIT , David Wennergren , Marty Wagner , patrick schambach , Nortel , alan kraft , novell , chris aherne , BMC Software , Tom Trezza
WFED's Jason Miller has details.
OMB says those who missed it must have corrective plans
White House cyber office working on strategy document to address issues around identity management. This is part of the administration's broader effort to better integrate all of these initiatives.
Internal documents obtained by Federal ews Radio details administration's plans to require use of the secure identity card, cloud computing, data center consolidation and several other initiatives. Current and former government officials say OMB clarified its stance on how to move forward with many of the former Bush administration initiatives.
Tags: technology , management , Vivek Kundra , OMB , budget , e-government , Lines of Business , cloud computing , cybersecurity , grants management , data center consolidation , teleworking , E-Travel
The Supreme Court has agreed to referee a dispute between NASA and some of its independent contractors over required security checks, a decision that could affect how the federal government investigates the background of current and future employees.