Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Teri Takai
Former Defense Department CIO Teri Takai joins Women of Washington radio hosts Aileen Black and Gigi Schumm for a discussion on women in government roles and her predictions for the Joint Information Environment.
Terry Halvorsen, who has served as the Navy Department's chief information officer since 2010, will become the acting DoD CIO next week.
Teri Takai will leave this week after serving as CIO since 2010. Takai assumed her current role in November 2010 after the Pentagon recruited her from California, where she had been serving as that state's CIO. She held the same job for the state of Michigan prior to that. She made the announcement about her departure this morning at a Chief Information Officers' Council meeting.
DoD CIO Teri Takai clarifies the Pentagon plans to use the FedRAMP baseline. DHS and GSA are working together to ensure the continuous diagnostics and monitoring program and FedRAMP are aligned. But questions remain around how other cyber initiatives fit into the cloud security program.
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
Tags: FedRAMP , GSA , DoD , Keith Alexander , Edward Snowden , cloud , cybersecurity , Mike Rogers , Robert Work , Treasury , Mark Reger , Danny Werfel , Norman Dong , OMB , Anne Rung , Dennis VanderTuig , Dan Gordon , OFPP , Lesley Field , jason miller , Inside the Reporters Notebook
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
The Pentagon is implementing most of the recommendations it made in 2010's Section 804 report to Congress. Katrina McFarland, DoD's assistant secretary for acquisition, said initial results of the change are promising. But an upcoming GAO report is expected to show DoD has a long way to go to move toward an agile, incremental approach to IT systems development.
After a Pentagon directive "with no escape clause" for all DoD components to migrate to a single email system, Navy and Marine Corps respond by studying the business case for doing so. Officials want to figure out the cost to move to the DISA-run service.
Military services and agencies have 120 days to draft strategies for shutting down their own email systems and migrating to DISA's enterprise email offering. The DoD CIO ordered the move to begin no later than the first quarter of 2015.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Tags: technology , cybersecurity , McAfee , Alma Cole , DHS , Gil Vega , Energy , Commerce , Simon Szykman , DoD , information sharing , Public-private partnership , Threat intelligence , jason miller