Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Technology
The new platform works like Wikipedia, which not only allows users greater access, but also ways to contribute information.
DorobekInsider: What you read Dec. 13-19 on the DorobekInsider, Daily Debrief, and FederalNewsRadio.com
Space food.. It's come a long way from "tubes and cubes," but there's some special planning involved in getting a turkey dinner with dressing into space.
Bringing a dot-com mindset to dot-gov by bringing experts together to solve government problems, that is the idea behind a new initiative called Expert Labs. We'll talk to Anil Dash about how it works and how you can participate.
Sometimes cloud computing can be a matter of "Brutal Standardization".
Federal News Radio's Max Cacas joins us with that, and other tales from today's AFCEA Cloud Computing Breakfast in Bethesda.
The former CIO of the intelligence agencies Dale Meyerrose joins us to talk about about information sharing and cybersecurity, and how dramatically the world has changed in 10 years.
Thursday, December 17th, 2009 at 2:05pm
In the growing on-line world of quick and unmonitored transactions and communications, virtual identities have become common elements of people's daily lives creating limitless opportunities for criminals to recruit, launder their money, and communicate under the cloak of anonymity. A panel of leading government experts discuss the way that our adversaries use these systems and how organizations can better prepare for the threats they are facing. From a commercial, law enforcement and security perspective, panelists will explain the scope of the problems and the potential benefits that can be derived from new social media
Tags: technology , Booz Allen Distinguished Speaker Series , Virtual Identity , cyber , crime , James A. Lewis , Dr. Reobert E. Young , Roy D. Dotson , Secret Service , Department of Homeland Security , Gary Cubbage , Booz Allen Hamilton