Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Technology
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
Deron Burba, the Smithsonian's CIO, said the organization will launch 3-D technology this fall to let researchers and others explore digital images like never before.
October 10, 2013
On this week's Agency of the Month show, David Bennett and Julie Mintz of DISA discuss providing cloud services for the Defense Department.
Sanjay Castelino, vice president at SolarWinds, will discuss how your agency can benefit from a concept call Virtual Desktop Infrastructure.
October 8, 2013
Ed Dorris, the CIO of the Comptroller of the Currency, said he evaluates IT policies, tools and procedures to ensure employees have a "hassle-free" IT environment.
October 3, 2013
Anne Neuberger, director of the National Security Agency's Commercial Solutions Center, explains the pluses and minuses of public-private partnerships for the cybersecurity world.
Lt. Gen. Susan Lawrence announced today is her last day in uniform after 41 years in the Army. She leaves a legacy as the Army CIO who oversaw a huge amount of change over the last two years.
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , identity management , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
How are agencies tackling the threats and vulnerabilities inherent in today's technology dependent government?
Continuous monitoring provides nearly real-time information in the face of cyber attacks and is essential for senior leaders making ongoing risk-based decisions that affect critical mission and business functions. OMB mandates and NIST guidelines require agencies to establish oversight mechanisms to evaluate systematically and ensure the continuing security, interoperability, and availability of systems and agency data. Tune into this interactive discussion to learn about the current state of risk management and how agencies are using continuous monitoring to maintain situational awareness of information security and organizational risk.
Some government agency websites were essentially turned off Tuesday morning, as the shutdown officially got underway. Agencies also began sending out messages via social media alerting followers that accounts would not be updated during the shutdown.