Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Teri Takai
DoD CIO Teri Takai clarifies the Pentagon plans to use the FedRAMP baseline. DHS and GSA are working together to ensure the continuous diagnostics and monitoring program and FedRAMP are aligned. But questions remain around how other cyber initiatives fit into the cloud security program.
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
Tags: FedRAMP , GSA , DoD , Keith Alexander , Edward Snowden , cloud , cybersecurity , Mike Rogers , Robert Work , Treasury , Mark Reger , Danny Werfel , Norman Dong , OMB , Anne Rung , Dennis VanderTuig , Dan Gordon , OFPP , Lesley Field , Jason Miller , Inside the Reporters Notebook
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
The Pentagon is implementing most of the recommendations it made in 2010's Section 804 report to Congress. Katrina McFarland, DoD's assistant secretary for acquisition, said initial results of the change are promising. But an upcoming GAO report is expected to show DoD has a long way to go to move toward an agile, incremental approach to IT systems development.
After a Pentagon directive "with no escape clause" for all DoD components to migrate to a single email system, Navy and Marine Corps respond by studying the business case for doing so. Officials want to figure out the cost to move to the DISA-run service.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , McAfee , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , information sharing , Public-private partnership , Threat intelligence , Jason Miller
The Defense Department has laid out an ambitious cloud computing strategy that includes building up and transitioning to an DoD-wide enterprise cloud environment as well leveraging a broad range of commercial services. DoD Chief Information Officer Teri Takai released the four-step strategy Wednesday. The strategy includes steps for winnowing down the number of data centers to a few "core" elements as well as phasing out dedicated infrastructures in favor of shareable, virtualized ones.
With the plan, defense leaders hope to harness the best that wireless technology can offer. The strategy includes goals for secure information sharing via voice, video and data feeds. It also promotes app development.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.