Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: In Depth
Gwynne Kostin is the Director of Mobile at the Office of Citizen Services & Innovative Technologies at GSA. She explains how the program is coming along and what exactly it's doing to help interagency collaboration.
Your agency is getting some help when it comes to future open source collaboration projects.
Greg Schaffer, the acting deputy undersecretary for the National Protection and Programs Directorate at DHS, said in Information Week that it's is one of the most complicated and difficult challenges they have.
The White House has said it will keep calling meetings until there's a deal.
Karen Evans is the Director of the US Cyber Challenge. And the former E-gov administration.
The ACT-IAC working group's latest report shows that diversity in agencies is directly linked to success. Dr. Susan Krup Grunin is the Consulting Director for Strategic Human Capital Management at RGS and co-authored the report.
The Thrift Savings Plan is often lauded as the best retirement plan in the country. But there's still some confusion about who's eligible for the TSP and how it works.
The time it takes to hire a new federal employee has dropped significantly in the past year. From roughly 180 days to just over 100.
Whether it's because we're in a rush, or we're naive, or we're just plain lazy, attackers know they can use various forms of what's sometimes called social engineering to use an organization's own employees against it.