Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: ODNI
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Whether the strategy is reducing personnel, consolidating offices or investing IT, "every one of them impacts people," said Ron Sanders, the former chief human capital officer for the Director of National Intelligence and now the executive adviser for Booz Allen Hamilton.
The General Service's Administration's Office of Governmentwide Policy is developing a new tool to make information sharing more efficient. Kathleen Turco, OGP's associate administrator, said the project is about half way to completion.
Agencies are struggling to keep up with the tremendous amount of data being created every day. DIA deputy director David Shedd said too much information and not having the right IT to sift through it is the biggest remaining challenge the government faces. Kshemendra Paul, the program manager for the Information Sharing Environment, said tagging and standards, such as NIEM, could help solve the data deluge.
Tags: technology , management , information sharing , Kshemendra Paul , James Clapper , David Shedd , DIA , Information Sharing Environment , WikiLeaks , CSIS , NIEM , suspicious activity reporting standard , Jason Miller
Spending on defense intelligence dropped by $3 billion, even though this year's budget for all intelligence agencies including the CIA rose by over $1 billion.
Chief information officers in the intelligence community said despite cultural challenges, it makes sense to treat the IC as one IT enterprise. They owe an implementation plan to IC agency heads by the end of this year.
Tags: technology , IT , intelligence community , CIA , NRO , NGA , NSA , DIA , Jeanne Tisinger , James Clapper , Al Tarasiuk , Jill Singer , Neill Tipton , industry , information sharing , cloud computing , budget , Jared Serbu
After a decade of uninterrupted spending growth, the Office of the Director of National Intelligence has submitted budget cutting plans for intelligence agencies to the White House. The intelligence community will try to save money mostly through IT efficiencies, and will try to protect its civilian workforce while drawing down on its reliance upon contractors.
Listen to this program on demand below
Originally Aired December 12th @ 3:05pm
Originally Aired April 4th at 3:05pm
Tags: technology , information sharing , Karen Evans , Dale Meyerrose , Vance Hitch , DoJ , zal , azmi , FBI , Carter Morris , Greg Baroni , Unisys , daniel kent , Cisco , Jim Flyzik , Tom Trezza , OMB
Document will address roles, responsibilities