Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Jason Miller
The Government Accountability Office released its first annual report required by Congress to examine overlap among federal programs. Auditors found agencies have redundant programs in everything from contracting to food safety to literacy education.
The agency and the CIO Council creates a list of the competencies cybersecurity workers need. OPM's Kichak said agencies will have a common understanding of the skills and abilities these employees need.
AFGE plans to protest on Wednesday the possible spending cuts to the Social Security Administration in more than 20 states. SSA Commission Astrue tried to alleviate spending concerns with an e-mail to employees. Meanwhile, SSA and AFGE are negotiating a new contract.
The Office of Personnel Management has officially defined what it means to be a federal IT security worker.
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
Ten months into his term as chief information officer of the EPA, Malcolm Jackson tells Federal News Radio about his priorities and his transition from the private sector.
February 24,2011(Encore presentation May 19, 2011)
The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.
Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , Common Access Card , physical access control , identity management , HSPD-12 ,
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.
DoD is trying to figure out how to keep risks that one part of the organization takes from affecting the rest of the military's networks. DISA addressing other security goals by adding PKI to secret network.
February 22nd at 10AM
In OMB's 25-point plan for Federal IT Reform, a mandate for agencies to adopt a Cloud First policy requires agencies to default to a cloud-based solution when evaluating options for new IT initiatives. Virtualization is the key to realizing the true benefits of cloud computing: cost savings, agility, flexibility and better resource utilization.