Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: McAfee
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , Teri Takai , information sharing , Public-private partnership , Threat intelligence , Jason Miller
Listen March 26th @ 12pm
Program will discuss the following: Current Status and Progress Made in Healthcare IT, Biggest Opportunities to use IT to drive down costs, Challenges or Major Hurdles to Still Overcome, Improvements in Security & Privacy of EHR's, Vision for The Future for Healthcare IT & NHIN
Listen June 26th at 12pm
Program will discuss the Current Status and Progress Made in Healthcare IT & with the NHIN, Best Practices & Benefits, Improvements in Security & Privacy of EHR's, and a Vision for The Future for Healthcare IT & NHIN
Listen December 4th@ 12pm
Program will discuss the following: Progress Report on Defense Cloud Computing Initiatives, Key Benefits with Cloud Computing, Key Challenges to Overcome, Addressing Security Concerns in a Cloud Strategy Environment, Lessons Learned & Best Practices, and A Vision for The Future
Tags: technology , Federal Executie Forum , Trezza Media Group , Mike Krieger , Alfred Rivera , Frank Konieczny , Louis Tempkin , CJ Wallington , Scott Montgomery , HP , General Dynamics Information Technology
Listen Tuesday January 29th @ 12pm
Program will discuss the following: Progress Report CyberSecurity in the Federal Government, Top CyberSecurity Priorities, Key Challenges to Overcome in IT Security, Lessons Learned, and A Vision for The Future
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
Tags: technology , cybersecurity , Obama Impact , David Smith , Potomac Institute , Bob Dix , Juniper Networks , Patrick Howard , SecureInfo Corp. , Phyllis Schneck , Information Security and Privacy Advisory Board , White House , Congress , Larry Clinton , Internet Security Alliance , Jason Miller
The Android platform has become a prime target for viruses. The operating system has struggled to catch up with Apple's IOS in terms of security.
The Army and DISA will release a broad agency announcement this summer seeking third party software to secure smartphones and tablet computers. The Marine Corps is looking at host of different possibilities to secure mobile devices, including a process to verify the software code in apps.
The survey warns shopper to be on alert for fake merchant sites and to take steps to protect their personal information.
Topping the annual list is malware targeting Android-powered mobile devices and Apple computes.