Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Karen Evans
Long before it hits Congress and reconciliation, your agency's budget has to be figured out. In a special panel discussion, Federal News Radio asks DoD's Mike McCord and former OMBer Karen Evans to explain how the magic happens.
This week, we bring you the Best of In Depth. Listen to a past conversation with former e-gov administrators Karen Evans and Mark Forman.
Former e-gov administrators Karen Evans and Mark Forman give their insight as to how federal cybersecurity management is changing now that President Obama's 60 Day Cyber Security Review is over a year old. Is FISMA a thing of the past? Find out by reading more.
Every year, one distinguished federal IT acquisition manager receives the coveted John J. Franke award for career excellence. The award last night went to Jim Williams, who recently retired from the GSA as the Commissioner of the Federal Acquisition Service.
"Continuing commitment to information technology" earns kudos from leader of Bush administration's IT operation.
SRA Chief Executive Officer believes in a greater focus on preventing intellectual property loss.
President Obama, OMB Director Peter Orszag, and Chief Performance Officer Jeffrey Zients want newer technology available all across government.
Congressman wants outlaw insecure, open network, peer-to-peer software from all government and contractor computers and networks.