Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Information Sharing
Federal prosecutors say data from users of Megaupload could be deleted as soon as Thursday.
Agencies are struggling to keep up with the tremendous amount of data being created every day. DIA deputy director David Shedd said too much information and not having the right IT to sift through it is the biggest remaining challenge the government faces. Kshemendra Paul, the program manager for the Information Sharing Environment, said tagging and standards, such as NIEM, could help solve the data deluge.
Tags: technology , management , information sharing , Kshemendra Paul , James Clapper , David Shedd , DIA , ODNI , Information Sharing Environment , WikiLeaks , CSIS , NIEM , suspicious activity reporting standard , Jason Miller
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Tags: technology , Alfred Rivera , DISA , Donna Dodson , NIST , cloud computing , Army , enterprise email , identity management , HSPD-12 , Common Access Card , cybersecurity , DoD , information sharing , Jason Miller
In the pilot, the government shares classified cyber threat information with selected contractors and their internet service providers.
Federal Agencies submitted their 2011 FOIA reports earlier this month, and all that information goes up on your agency's website and at FOIA.gov by Feb. 1.
For the past year, the Library of Congress has been working with Twitter in a transfer of the company's entire electronic data set. Library's digital director sees this as a "unique record of our time."
DISA wants improve its enterprise information visibility for the department's 15,000 unclassified networks by creating an Enterprise Information Web. The semantic Web will allow data to be more easily shared and reused across the department.
Bipartisan legislation introduced in the House today would allow the federal government to share classified cybersecurity threat information with private companies.
Host Bob Leins and John Elliot are joined by Kaiser Permanente's Dr. Jaewon Ryu, Jeff Goldman and John Patrick. They discuss how health care is being changed by the widespread use of electronic medical records.
November 14, 2011
Tags: For Your Benefit , pay and benefits , Bob Leins , John Elliot , Kaiser Permanente , health care , electronic medical records , patient safety , John Patrick , Jeff Goldman , Dr. Jaewon Ryu , NITP , information sharing , Health IT
NATO and its members say a network they constructed to tie together the national networks of the various militaries operating in Afghanistan is a success story — except for the fact that the network took eight years to get up and running. But U.S. Defense officials said they have a better understanding for future coalition operations for how best to build such a network.