Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Karen Evans
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
A group of former federal cybersecurity experts and professionals have made recommendations for improving federal cybersecurity guidance, such as the Office of Management and Budget's Circular A-130.
A group of experts released a white paper recommending changes to OMB Circular A-130. The suggestions center on continuous monitoring, the role of DHS in overseeing FISMA and the definitions of a major IT system and a national security system.
Six years after the Veterans Affairs data breach, civilian agency networks and computers are more secure. Current and former federal officials and cyber experts say from secretaries on down, the threat of a cyber attack and the impact on mission is well understood.
Tags: technology , Cybersecurity Rising , Dan Chenok , IBM , Information Security and Privacy Advisory Board , U.S. Cyber Challenge , Alan Paller , SANS Institute , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , OMB , cybersecurity , Paul Nicholas , Microsoft , TIC , Federal Desktop Core Configuration , FISMA , continuous monitoring , Cyber Workforce , Jason Miller
In 2010, the Office of Management and Budget unveiled a sweeping plan to reform federal IT projects, encompassing 25 focus areas. Among them: Shuttering data centers and transitioning to cloud-computing platforms and implementing more robust metrics and processes to effectively manage large-scale IT projects. Federal IT experts evaluate agencies' progress on the initiative and discuss why they believe it has been effective as part of the special report, The Obama Impact: Evaluating the Last Four Years.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , cybersecurity , Frank Reeder , Dan Chenok , OMB , technology , NIST , DHS , Information Security and Privacy Advisory Board , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.
Dan Chenok, a senior fellow in the IBM Center for the Business of Government, and Karen Evans, the former E-Gov administrator in the Office of Management and Budget, count down the top federal news stories of the week.
Two former administrators in the Office of E-Government & Information Technology at the Office of Management and Budget, Karen Evans and Mark Forman, joined In Depth with Francis Rose to discuss the mobile push in government, especially as OMB has recently broadened the focus.
Karen Evans, former administrator of the Office of Electronic Government and Information Technology at the Office of Management and Budget, offers her insight on how federal agencies can protect themselves in the aftermath of recent cyber attacks.