Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: identity management
Focus on procurement and cyber coordinator biggest differences as compared to Bush administration's CNCI. Pres. Obama to begin with 24 actions to improve IT security.
New report looks at the Comprehensive National Cybersecurity Initiative started by the Bush administration. Auditors make six recommendations to improve how agencies work on these 12 issues.
Fiscal 2011 technology budget request is $79 billion and Vivek Kundra says that will address several challenges, including closing the gap between the private and public sector. GSA will run new apps store for handheld devices. OMB will lead the review of troubled IT programs.
Tags: technology , Vivek Kundra , Howard Schmidt , OMB , VA , EPA , GSA , CGI , Apple , cybersecurity , 2011 budget , IT Dashboard , mobile computing , TechStat , program management , PMAS , HSPD-12 ,
Releases report exactly five years after 9/11 Commission Report.
Government leaders are embracing innovation to modernize systems and leverage technology to provide the next generation of citizen services and strengthen security in the face of growing cyber threats and privacy requirements.
The Department of Homeland Security wants states to describe how they are complying with the 2005 law.
The agency teams up with the SAFE BioPharma Association to digitally sign documents and improve the time it takes to get clinical trials going. NCI and the association are using the standards developed by the Federal Bridge. The two organizations are putting the concepts in the National Strategy for Trusted Identities in Cyberspace (NSTIC) into practice.
Henry Sienkiewicz, DISA's chief information officer, said the move to Fort Meade, Md. has given his office the opportunity to upgrade and transform its technology network and how employees use IT day-to-day.
May 26, 2011