Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Karen Evans
Karen Evans, the national director of the U.S. Cyber Challenge and the former E-Government administrator at the Office of Management and Budget, says the strategic use of IT should be the No. 1 priority for agency technology managers this year.
Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group discuss what you can do to reduce the risk of cyber attacks at your agency.
January 1, 2013
Tags: technology , security management , cybersecurity , mobile technology , KE&T Partners , Julie Anderson , Civitas Group , mobile security , CSIS , duplication , cyber attacks , John Gilroy , Federal Tech Talk
The 10-year-old law created a centralized oversight and advocate in OMB for IT management and programs. It also focused on making the government more citizen-centered and having agencies collaborate on delivering services to the public.
Tags: technology , management , Dan Chenok , Kevin Landy , Mark Forman , Doug Bourgeois , Information Technology and Innovation Foundation , E-Government Act of 2002 , FISMA , IBM , Government Transaction Services , VMware , Jason Miller
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
In 2010, the Office of Management and Budget unveiled a sweeping plan to reform federal IT projects, encompassing 25 focus areas. Among them: Shuttering data centers and transitioning to cloud-computing platforms and implementing more robust metrics and processes to effectively manage large-scale IT projects. Federal IT experts evaluate agencies' progress on the initiative and discuss why they believe it has been effective as part of the special report, The Obama Impact: Evaluating the Last Four Years.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , cybersecurity , Frank Reeder , Dan Chenok , OMB , technology , NIST , DHS , Information Security and Privacy Advisory Board , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.