Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Rob Carey
Rob Carey spent 31 years in federal technology, but his "wow" moment came toward the end of his tenure. Carey recently retired from the Defense Department, becoming at least the ninth senior technology official to leave government since November. Carey is the former principal deputy CIO at the Defense Department and now is the vice president and general manager for cybersecurity at CSC. He tells executive editor Jason Miller on Ask the CIO about the moment when he knew technology had changed government. Listen to the full show.
Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.
Teri Takai will leave this week after serving as CIO since 2010. Takai assumed her current role in November 2010 after the Pentagon recruited her from California, where she had been serving as that state's CIO. She held the same job for the state of Michigan prior to that. She made the announcement about her departure this morning at a Chief Information Officers' Council meeting.
Rob Carey, the principal deputy CIO at the Defense Department, will retire after 31 years in government. He is at least the seventh high level and long-time federal technology official to leave government in the last six months.
Military services and agencies, alike, are under pressure from senior defense officials to find savings from IT Rob Carey, DoD's deputy CIO said at the annual Executive Leadership Conference. In the coming weeks, Defense CIO Teri Takai will issue a memo detailing a new strategy for bringing existing consolidation and standardization efforts together. The budget pressures have helped push the department out in front of emerging cyber and mobile technologies.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Martin Dempsey , Robert Lentz , Stephen Boutelle , U.S. Cyber Command , defense industrial base , critical infrastructure , NIST , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Jared Serbu , Cybersecurity Rising
A new Federal News Radio survey of federal chief information officers shows that budget cuts are among their biggest concerns. Senior technology managers also said among the biggest benefits they are seeing from moving systems to the cloud is cost savings. DoD deputy CIO Rob Carey said the Pentagon is setting certain changes in motion as part of its move to the cloud to help deal with an assortment of challenges.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Tags: DoD , Intelligence community , GEOINT , Intelligence Community Information Technology Enterprise , Joint Information Environment , identity management , attribute-based access control , Al Tarasiuk , James Clapper , Jared Serbu
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Learn more in this afternoon's cybersecurity update.