Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Potomac Institute
Jim Bradley of the GPO talks about The Plum Book. Administrator John Pistole discusses new security measures at the Transportation Security Administration. Dr. Patricia Hayes wants female vets to know VA is the right place for their healthcare needs. The Potomac Institute's Mike Sweetnam says the government's hodgepodge approach to cybersecurity is no way to prepare for a cyberwar.
Export-Import Bank President Fred Hochberg explains why his agency had a banner year, with a record number of transactions in fiscal 2012. And a professor at the Wharton School describes how private insurance companies are making money off the National Flood Insurance Program — but taxpayers are likely to pick up the slack when claims surpass premiums.
Congress has told the Pentagon to stem the tide of suspected counterfeit parts that ultimately end up in military technology systems. First though, DoD has to come to grips with the fact that it can't simply mandate change to an industrial base it once controlled.
The administration has struggled to fulfill its promise to take enough concrete steps to make cybersecurity a national security priority. Experts say the White House fell short in several areas, most notably in getting comprehensive cyber legislation passed.
Tags: technology , cybersecurity , Obama Impact , David Smith , Bob Dix , Juniper Networks , Patrick Howard , SecureInfo Corp. , Phyllis Schneck , McAfee , Information Security and Privacy Advisory Board , White House , Congress , Larry Clinton , Internet Security Alliance , Jason Miller
Former Ambassador David Smith, now with the Potomac Institute Cyber Center, told The Federal Drive with Tom Temin there are positive elements to both cybersecurity bills currently introduced in the Senate.
Federal News Radio gets insights from Professor Yonah Alexander, a senior fellow at the Potomac Institute for Policy Studies and Director of its International Center for Terrorism Studies, and from Tom Joscelyn, senior fellow and executive eirector of the Center for Law and Counterterrorism at the Foundation for Defense of Democracies.
An event this week sponsored by Potomac Institute in Arlington, Va., evaluates government's cyber spending priorities.