Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Rob Carey
Military services and agencies, alike, are under pressure from senior defense officials to find savings from IT Rob Carey, DoD's deputy CIO said at the annual Executive Leadership Conference. In the coming weeks, Defense CIO Teri Takai will issue a memo detailing a new strategy for bringing existing consolidation and standardization efforts together. The budget pressures have helped push the department out in front of emerging cyber and mobile technologies.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Martin Dempsey , Robert Lentz , Stephen Boutelle , U.S. Cyber Command , defense industrial base , critical infrastructure , NIST , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Jared Serbu , Cybersecurity Rising
A new Federal News Radio survey of federal chief information officers shows that budget cuts are among their biggest concerns. Senior technology managers also said among the biggest benefits they are seeing from moving systems to the cloud is cost savings. DoD deputy CIO Rob Carey said the Pentagon is setting certain changes in motion as part of its move to the cloud to help deal with an assortment of challenges.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Tags: DoD , intelligence community , GEOINT , Intelligence Community Information Technology Enterprise , Joint Information Environment , identity management , attribute-based access control , Al Tarasiuk , James Clapper , Jared Serbu
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Learn more in this afternoon's cybersecurity update.
In the Defense department, the goal of consolidating tens of thousands of IT systems and networks into a more manageable structure is not exactly new. But some leaders in the department think with new budget pressures in play, they'll be able to make some serious progress.