Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: White House
The Army and DISA will release a broad agency announcement this summer seeking third party software to secure smartphones and tablet computers. The Marine Corps is looking at host of different possibilities to secure mobile devices, including a process to verify the software code in apps.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Howard Schmidt, on his blog, lists the areas for improvement within federal cybersecurity.
A new Internet Botnet Group will bring together federal and industry experts to try to stem the tide against botnet attacks. Experts estimate one in 10 computers are controlled by bad actors using malicious software to attack organizations. FCC working groups released three reports with recommendations for improve cybersecurity.
Tags: technology , Miriam Perlberg , Julius Genachowski , FCC , NIST , National Security Council , cybersecurity , botnets , Steve Crocker , Shinkuro , Messaging Anti-Abuse Working Group , Communications, Security, Reliability and Interoperability Council , DNSSEC , Jason Miller
Lawmakers weigh public's right to know against the need to protect cyber secrets. Sen. Patrick Leahy's (D-Vt.) provision in 2012 Defense authorization bill tightens the definition of "exemptions," but he questions the need for further rules to give agencies power to withhold information.
Tags: Sunshine Week , transparency , open government , Congress , FOIA , Senate Judiciary Committee , Patrick Leahy , Charles Grassley , Paul Rosenzweig , Jerry Ensminger , Melanie Pustay , Kenneth Bunting , National Freedom of Information Coalition , Jared Serbu , DoJ , Barack Obama , Navy , DoD , management
White House officials were in close contact with the Agriculture Department in the hours leading up to Agriculture Secretary Tom Vilsack's decision to fire USDA employee Shirley Sherrod in 2010, according to administration emails.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
The President thanked those who fought its battles by sitting down to a candlelit meal with a small cross section of the million-plus who served there over the past nine years.
The size of the federal workforce has been an issue of political discussion for the past couple years. But amid everything else in the official 2013 budget request unveiled Monday, the overall size of the federal government, in terms of staffing levels, will remain relatively constant.