Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: State
Lovisa Williams, the deputy director for State's International Information Programs Bureau of Innovative Engagement, said her office spends about 50 percent of their time educating feds on the risks of social networking tools.
Secretary of State Hillary Clinton encourages innovators to use technology to help the world's most pressing problems. The idea is already in practice with the Apps 4 Africa contest, which State helps fund.
Alec Ross is the Senior Advisor for Innovation in the Office of Secretary of State Hillary Clinton said 21st century statecraft already has provided some short-term successes.
Agriculture plans to update its second version of its green IT strategy this year. State is implementing power management tools and could save almost $2 million. Both agencies are making headway to change the culture of how IT is used by their respective employees.
Tags: Green government , technology , Chris Smith , Susan Swart , USDA , green IT , data center consolidation , power management , GreenGov Symposium , Jason Miller , Greening of Government: Technology
Congressmen Skelton and Davis say legislation would apply the lessons learned from Goldwater-Nichols Act to more than 13 agencies to help promote collaboration and understanding of each other's roles. The bill calls for a two-year detail for each senior official to learn how other national security agencies work.
Tags: pay and benefits , management , Ike Skelton , Geoff Davis , House Armed Services Committee , DoD , Treasury , USDA , James Loser , Project on National Security Reform , national security personnel , training , Goldwater-Nichols Act , Jason Miller
A congressionally chartered commission said the State Department does not have the training or expertise to take over security operation in Iraq when the military departs at the end of 2011.
The Center for a New American Security (CNAS) released three publications today that offer policy recommendations for the QDDR team.
E-Mentees will be recruited through State's existing network of thousands of alumni from exchange programs focusing on entrepreneurship, and others who express serious interest in entrepreneurial guidance. We get details from the State Department's Steven Koltai.
A small army of American diplomats left behind is embarking on a long and perilous path to keeping Iraq from slipping back to the brink of civil war. Michael Corbin is the Deputy Assistant Secretary of State in the Bureau of Near Eastern Affairs for Iraq issues explains the road ahead.
August 11th at 11:05am
The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.
The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.