Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: In Depth
Greg Schaffer, the acting deputy undersecretary for the National Protection and Programs Directorate at DHS, said in Information Week that it's is one of the most complicated and difficult challenges they have.
The White House has said it will keep calling meetings until there's a deal.
Karen Evans is the Director of the US Cyber Challenge. And the former E-gov administration.
The ACT-IAC working group's latest report shows that diversity in agencies is directly linked to success. Dr. Susan Krup Grunin is the Consulting Director for Strategic Human Capital Management at RGS and co-authored the report.
The Thrift Savings Plan is often lauded as the best retirement plan in the country. But there's still some confusion about who's eligible for the TSP and how it works.
The time it takes to hire a new federal employee has dropped significantly in the past year. From roughly 180 days to just over 100.
Whether it's because we're in a rush, or we're naive, or we're just plain lazy, attackers know they can use various forms of what's sometimes called social engineering to use an organization's own employees against it.
When it comes to federal contracting, you probably know the big names -- like Lockheed Martin and Northrop Grumman.
There's no cyberspace Geneva convention to govern specifically what is allowed in the event of a cyber war, and there's precious little formal agreement around the world on issues like international freedoms in cyberspace and governance of the Internet.