Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: auditing
The Obama administration has released a set of proposals it hopes will improve the oversight of grant programs. Danny Werfel, controller at the Office of Management and Budget, told Federal News Radio why the changes are necessary.
It's news that only an accountant could love: the Federal agency responsible for everything from office building leases to paper clips celebrates yet another "clean audit opinion". And, in the process, we learn just what sets the General Services Administration apart from other agencies when it comes to how it accounts for the federal funds it spends.
How will the GAO celebrate a big milestone? We hear from Comptroller General Gene Dodaro
Sen. Chuck Grassley, issuing his second report on the status of the Defense Department's inspector general, said there are "positive trends" in the office he has previously criticized but he and his staff still give the IGs work a "D minus."
Big changes are in the works for the Pentagon Inspector General's Office after a report from one of the top Republicans in the Senate finds billions of dollars in possible fraud and overpayments. The Project on Government Oversight receives a response from the DoD IG detailing a new approach to how it does business.
The House Armed Services Committee has given unanimous approval to a bill that would mandate sweeping reforms of the Pentagon's non-weapons system contracting and acquisitions programs. The bill, HR 5013, enjoys broad bi-partisan support and is being fast-tracked for a possible vote as early as next week.
Last year, Congress passed and sent on to President Obama a bill to reform how the Pentagon acquires large weapons systems. Now, House lawmakers are back with a proposal to reform the other 80 percent of Defense Department procurement that does not have to do with weapons.
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation