Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: technology
The Homeland Security Department's CIS is using a continuous delivery model where it automates reviews of software code to ensure security and quality. DHS is using a similar approach for mobile apps called the Carwash, where it's checking the code to compliance with specific requirements.
Kevin Kelly, CEO of LGS Innovations, will discuss how his company can help improve network security at your agency.
December 17, 2013
The Air Force's Service Development and Delivery Process aims to deliver data hosting, enterprise management, security and other IT functions as standards-based services to be used by the entire organization.
More than a dozen industry technology and business groups are asking the House to adopt language in the Senate's Commerce, Justice, Science appropriations bill that would focus on risk when buying technology products and services from companies that have connections to China.
The annual policy legislation also doesn't merge the DoD CIO and deputy chief management officer.
Tags: Congress , DoD , House Armed Services Committee , Senate Armed Services Committee , Federal IT Acquisition Reform Act , Darrell Issa , Jeanne Shaheen , CIO , deputy chief management officer , Defense Authorization Bill , cloud computing , heath IT , Jason Miller
Employees at the departments of Treasury, Homeland Security and State can use their HSPD-12 smart cards to log onto the intelligence community's unclassified sharing platform. Most recently, the departments of Health and Human Services, Veterans Affairs and the Justice Department's Bureau of Alcohol, Tobacco, Firearms and Explosives will have access to the tools and applications through their smart identity cards.
Bernie Mazer, the Interior Department's chief information officer, said among his top priorities are data center consolidation, cloud hosting, cybersecurity and strategic sourcing. He said the goal is to let the bureau level IT executives focus on mission and not worry about commodity IT.
Paul Christman, vice president Public Sector at Dell Software, discusses how his company can help you solve identity management issues at your agency.
December 10, 2013
Seven months after the White House issued a new policy and executive order, some agencies have met the requirements to release their data inventories and create a "/data" page. But many agencies have yet to follow through on the milestones.
This discussion explores how agencies are protecting sensitive data, reducing risk
and curtailing the costs associated with data breaches while ensuring compliance
with expanding government data privacy policies.
Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss.