Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: Teri Takai
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , McAfee , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , information sharing , Public-private partnership , Threat intelligence , Jason Miller
The Defense Department has laid out an ambitious cloud computing strategy that includes building up and transitioning to an DoD-wide enterprise cloud environment as well leveraging a broad range of commercial services. DoD Chief Information Officer Teri Takai released the four-step strategy Wednesday. The strategy includes steps for winnowing down the number of data centers to a few "core" elements as well as phasing out dedicated infrastructures in favor of shareable, virtualized ones.
With the plan, defense leaders hope to harness the best that wireless technology can offer. The strategy includes goals for secure information sharing via voice, video and data feeds. It also promotes app development.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.
Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.) introduced legislation to make sharing of classified cyber threat information easier between the government and the private sector. The bill builds on DoD's Defense Industrial Base pilot to share data about vulnerabilities. DoD plans to expand the DIB pilot to more than 200 companies in the coming year.
Tags: technology , cybersecurity , DoD , DHS , House Intelligence Committee , House Armed Services Committee , Keith Alexander , Mike Rogers , Dutch Ruppersberger , information sharing , defense industrial base , Jason Miller
The military's chief information officer, Teri Takai, said after the Army completes its migration to DISA's email-as-a-service, the Air Force will be next. She said the Navy also is in discussions to move to the cloud. DoD soon will release a new cloud computing strategy and standards guide for industry.
March 22, 2012(Encore presentation April 19, 2012)
Energy, DHS and DoD CIOs told House lawmakers how each of their agencies is reducing duplicative systems. GAO released its latest report on the IT dashboard and found the three agencies need to improve how they categorize projects.
Tags: technology , management , budget , DoD , DHS , Energy , Richard Spires , Mike Locatis , House Oversight and Government Reform Commitee , IT governance , IT efficiencies , GAO , David Powner , IT Dashboard , Jason Miller
The Defense Department chief information officer needs more clout when it comes to implementing cloud computing, according to an advisory committee consisting of industry executives.
Congress wants two reports on enterprise email: one from the Army that is due by Jan. 31 and another from DoD CIO Teri Takai by June. Army deputy CIO Mike Krieger said the requirement for a report caused the service to delay the program for 30 days and would push back the final migration date to at least mid-May.
A new report highlights fewer CIOs are reporting to their agency's secretary today than in 2004. More of these senior technology managers wear more than one-hat and are responsible for many areas outside the 13 the statute originally called for.