Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: compliance
The Food and Drug Administration wants the public to comment on eight draft proposals aimed at making the agency's enforcement data more "accessible and user-friendly," according to a release.
Host Roger Waldron talks with Jason Workmaster, partner at McKenna Long & Aldridge about the unique pricing policies and procedures of the $45 billion Multiple Award Schedule program.
January 18, 2011
Tags: Multiple Award Schedule , Price Reduction Clause , False Claims Act , Jason Workmaster , McKenna Long & Aldridge , Roger Waldron , Coalition for Government Procurement , Off the Shelf , contracting
Jonathan Aronie writes in the Government Contracts blog that SBA's suspension of GTSI could have industry-wide implications.
Vice President, Consulting
The Washington Management Group
September 15th, 2009
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation