Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Potomac Institute
Jim Bradley of the GPO talks about The Plum Book. Administrator John Pistole discusses new security measures at the Transportation Security Administration. Dr. Patricia Hayes wants female vets to know VA is the right place for their healthcare needs. The Potomac Institute's Mike Sweetnam says the government's hodgepodge approach to cybersecurity is no way to prepare for a cyberwar.
Export-Import Bank President Fred Hochberg explains why his agency had a banner year, with a record number of transactions in fiscal 2012. And a professor at the Wharton School describes how private insurance companies are making money off the National Flood Insurance Program — but taxpayers are likely to pick up the slack when claims surpass premiums.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
Tags: technology , cybersecurity , Obama Impact , David Smith , Bob Dix , Juniper Networks , Patrick Howard , SecureInfo Corp. , Phyllis Schneck , McAfee , Information Security and Privacy Advisory Board , White House , Congress , Larry Clinton , Internet Security Alliance , Jason Miller
Former Ambassador David Smith, now with the Potomac Institute Cyber Center, told The Federal Drive with Tom Temin there are positive elements to both cybersecurity bills currently introduced in the Senate.
Federal News Radio gets insights from Professor Yonah Alexander, a senior fellow at the Potomac Institute for Policy Studies and Director of its International Center for Terrorism Studies, and from Tom Joscelyn, senior fellow and executive eirector of the Center for Law and Counterterrorism at the Foundation for Defense of Democracies.
An event this week sponsored by Potomac Institute in Arlington, Va., evaluates government's cyber spending priorities.