Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Jared Serbu
Current definitions of cyberspace have led to confusion about roles, responsibilities, lanes in the road, a top Air Force general said Thursday. Senior leaders will convene a summit in November to zero-in on a common understanding of cyber.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Tags: DoD , intelligence community , GEOINT , Intelligence Community Information Technology Enterprise , Joint Information Environment , identity management , attribute-based access control , Rob Carey , Al Tarasiuk , James Clapper ,
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Tags: intelligence , technology , ODNI , NGA , GEOINT , James Clapper , Letitia Long , Intelligence Community Information Technology Enterprise , shared services , cloud computing , common desktop , NSA , CIA , DIA
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Tags: cybersecurity , technology , NIST , DHS , NSA , DISA , Peggy Maxon , Roger Greenwell , Charles Clancy , Virginia Polytechnic Institute and State University , Hume Center for National Security and Technology , INSA , workforce
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
Tags: technology , Congress , cybersecurity , National Security Agency , U.S. Cyber Command , Keith Alexander , House Intelligence Committee , Mike Rogers , CISPA , information sharing , U.S. Chamber of Commerce
As service transitions to Air Force and DoD enterprise IT models, defining what technology services should be shared is still on the to-do list. The service's AFNet program is the umbrella effort to centrally-manage many commodity IT functions.
The Defense Department has marked the week of Oct. 1 as Absentee Voting Week. It's urging service members living overseas to register to vote and to take care of absentee balloting while there's still time for mail to make its way to and from local election jurisdictions.
Procurement will start with management of 5,000 mobile devices, plus app stores for consumers inside and outside of VA. The agency awarded a three-year, $9.3 million deal to Longview International Technology Solutions to build and manage the technology in the cloud.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.