Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: IT
The National Academy of Public Administration says the Social Security Administration is not ready for the challenges of the future. NAPA says shrinking budgets, retiring workers and rapidly changing technology are all issues that need to be addressed in the next 15 years.
Cyber criminals are adjusting so quickly that it's become an 'arms race' between them and agency technology officers trying to guard against threats. During a recent Federal News Radio panel discussion, officials shared expertise and tactics for protection.
The complexity of adding mobile devices to federal networks makes them more susceptible to IT problems. That's according to a survey of federal network managers by MeriTalk. They say virtualization, complex mobile systems, and cloud computing are causing network disruptions that prevent agencies from carrying out their missions. The network managers believe they can cut the complexity of their agency's network in half, which they say could reduce their agency's IT spending by 20 percent.
Inside the Reporter's Notebook: FedRAMP compliance results months away, OMB's word of the year: Effectiveness
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Tags: FedRAMP , OMB , Steve VanRoekel , Beth Cobert , Lisa Schlosser , PortfolioStat , management , Jennifer Kerber , David Walker , Katie Lewin , GSA , Sonny Hasmi , Casey Coleman , Senate , Jason Miller , Inside the Reporters Notebook
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
GSA Office of Government-wide Policy Chief of Staff Stephanie Rivera discusses efforts to create a standardized operating process for all agencies, and the challenges and opportunities that go along with it.
Modernization and meeting customer need are critical to remaining relevant. Acquisition Operations Director Jim Ghiloni and Schedule 70 Director Kay Ely discuss the agency's ongoing strategy on Agency of the Month.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. GSA and SBA continue their ongoing quarrel over the Office Supplies 3 contract, and April marks the three-year anniversary of NSTIC's release.
The intelligence community is ready to start deploying shared IT systems. Federal News Radio's Jared Serbu reports all 17 IC agencies will use the Intelligence Community Information Technology Enterprise or ICITE. It's just one of the big IT programs government agencies are working on. Richard Spires, CEO of Resilient Network Systems and former CIO of the Homeland Security Department, is writing about five elements for managing a successful IT program.
OPM Director Katherine Archuleta stays true to her word when it comes to IT.