Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Max Cacas
Just as the Pentagon depends on DARPA to keep the military on the cutting edge of science and technology, so too, does the Department of Homeland Security have an ARPA to keep DHS agencies out on the technological edge. On this edition of AFCEA Answers, Dr. Adam Cox, Acting Director of the Homeland Security Advanced Projects Research Agency (HSARPA) discusses the similarities - and the differences - between his organization and DARPA. He explains how "tech foraging" allows HSARPA to meet customer needs while saving taxpayers a buck or two. And he offers an unclassified look at some forward thinking technological solutions now being developed for transportation and border security.
The nation's top intelligence official says transparency is going to have to be a feature of the intelligence community from now on. Gen. James Clapper, the director of national intelligence says that's his main takeaway from the Edward Snowden leaks and their continuing fallout. Clapper is the guest on the latest edition of AFCEA Answers on Federal News Radio. In this excerpt, he told host Max Cacas he makes no apologies for the programs Snowden exposed, but intelligence agencies need to do a better job of explaining why they do what they do.
Members of the U.S. Intelligence Community have found themselves to be the source of a good deal of scrutiny in recent years, not all of it welcome. In this exclusive two-part interview, the Honorable James Clapper, Jr., Director of National Intelligence, discusses recent efforts to stem news leaks in the Intelligence Community; a new "roadmap" outlining the IC's technology requirements in the future; and the effort to improve the speed and reliability of federal employee and contractor security clearances. Also we'll preview the upcoming Intelligence and National Security Summit, scheduled for Sept. 18-19 in Washington, and co-sponsored by INSA and AFCEA International.
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The Department of Defense is in the midst of a large-scale revamping of its information infrastructure. The Joint Information Environment (JIE) promises to facilitate information sharing among the military services, other government stakeholders, and coalition partners. And it will do so while consolidating resources at a time of budgetary challenges. In this edition of AFCEA Answers, DOD Deputy CIO David DeVries offers a progress report on the JIE, and hints at how they will inevitably measure success. Also: a preview of the upcoming AFCEA JIE Mission Partner Symposium, May 12 - 14 in Baltimore.
For the U.S. Navy, Information Dominance has become just as important a pillar in its warfighting strategy as fast planes and sturdy warships. This week on AFCEA Answers, our guest, Vice Admiral Ted Branch, USN, the Navy's N2/N6 and Director of Naval Intelligence, explains how industry can benefit from understanding the Navy's priorities when it comes to Information Dominance. He will also explain how he manages to juggle four different jobs that are all related to the mission of Information Dominance.
At a time when spending reductions, winding down two decade-long wars, and new threats from new adversaries is the "new normal"; one of the Defense Department's challenges is managing amidst all this change. In this edition of "AFCEA Answers," we'll talk to Kevin Scheid, Acting Deputy Chief Management Officer with DOD about new initiatives to manage the largest federal agency. Hear how a shift in responsibility for business system IT has changed the job of one top DOD official. Plus: Defense Secretary Chuck Hagel, working on a roadmap to improve management of the Department of Defense.
Whether it's network bandwidth, acquisitions, cybersecurity, or the Joint Information Environment, Rear Admiral Bob Day, Chief Information Officer of the U.S. Coast Guard has been involved in answering the service's information technology challenges. In this edition of "AFCEA Answers", Adm. Day, who also serves as Commander of Coast Guard Cyber Command, reflects on his 5 years as CIO, and his 34 years of military service as he prepares to retire this summer. He considers IT to be a "mission enabler" for the Coast Guard, and points to the recently deployed "Rescue 21" shipboard communications system, which he says, "is taking the ‘search' out of search-and-rescue."
When minutes count, timely information sharing could be the difference in stopping terrorists and saving lives. This week on "AFCEA Answers", we'll talk to Kshemendra Paul, Program Manager for the Information Sharing Environment in the Office of the Director of National Intelligence. His office spearheads an effort to make possible information sharing between Federal, state and local law enforcment. Its part of a trend toward rapid and secure sharing of critical data when time is of the essence.
With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.