Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: technology
Paul Christman, vice president Public Sector at Dell Software, discusses how his company can help you solve identity management issues at your agency.
December 10, 2013
More than a dozen industry technology and business groups are asking the House to adopt language in the Senate's Commerce, Justice, Science appropriations bill that would focus on risk when buying technology products and services from companies that have connections to China.
Bernie Mazer, the Interior Department's chief information officer, said among his top priorities are data center consolidation, cloud hosting, cybersecurity and strategic sourcing. He said the goal is to let the bureau level IT executives focus on mission and not worry about commodity IT.
Seven months after the White House issued a new policy and executive order, some agencies have met the requirements to release their data inventories and create a "/data" page. But many agencies have yet to follow through on the milestones.
This discussion explores how agencies are protecting sensitive data, reducing risk
and curtailing the costs associated with data breaches while ensuring compliance
with expanding government data privacy policies.
Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss.
Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues.
December 9, 2013
Tags: acquistion , contracting , federal IT , information technology , cloud computing , cybersecurity , IT acquisition , continuous monitoring , mobile technology , big data , data analytics , shared services , FITARA , Jason Miller , Federal News Radio , Ask the CIO , Mark Amtower , Amtower Off Center , BYOD
The 'Needipedia' project is designed to stay within federal procurement law, but it short cuts some of the steps that cause agencies to wait months or years to solve current-day problems. DIA releases RFPs connected to an ongoing Broad Agency Announcement to give contractors a path to offer technology more directly.
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.