Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: technology
Inside the DoD Reporter's Notebook: DoD releases missing piece of 2015 budget; defense acquisition 'good enough'
The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The Department of Defense is in the midst of a large-scale revamping of its information infrastructure. The Joint Information Environment (JIE) promises to facilitate information sharing among the military services, other government stakeholders, and coalition partners. And it will do so while consolidating resources at a time of budgetary challenges. In this edition of AFCEA Answers, DOD Deputy CIO David DeVries offers a progress report on the JIE, and hints at how they will inevitably measure success. Also: a preview of the upcoming AFCEA JIE Mission Partner Symposium, May 12 - 14 in Baltimore.
The Homeland Security Department is putting up almost $100 million to fund the next generation of cybersecurity technologies. DHS issued a broad agency announcement that lists the first four areas in which DHS wants to know the art of the possible. Doug Maughan, director of the DHS Science and Technology Directorate's cybersecurity division, tells Federal News Radio Executive Editor Jason Miller about the initial set of cybersecurity research areas. Read Jason's related article.
The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.
Lt. Gen. Robert Ferrell, the Army's CIO/G6, said the service now is requiring all enterprise software titles to be modernized, virtualized and migrated to an approved data center.
The nomination of Shaun Donovan to be director of the Office of Management and Budget as well as a variety of bills dealing with federal IT reform and cybersecurity updates crowded the docket of the Senate Homeland Security and Government Affairs Committee business meeting Wednesday.
Tags: Congress , OMB , Shaun Donovan , Tom Carper , Tom Coburn , IT reform , cybersecurity , Senate Homeland Security and Governmental Affairs Committee , Beth Cobert , Mark Forman , TASC , Erica McCann , Daniel Castro , Jason Miller
After a failed attempt to build a shared system with VA, the Defense Department is in a hurry to replace its aging health IT system. DoD says the final product will be an off-the-shelf commercial solution with as few changes as possible.
The Defense Intelligence Agency will inaugurate its new Open Innovation Gateway on Wednesday, as part of its strategy to bring new technologies into the intelligence community from non-traditional vendors, and to buy new capabilities within weeks instead of years.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.
Tags: DATA Act , financial management , A-11 , OMB , Senate Homeland and Governmental Affairs Committee , FITARA , FISMA , cybersecurity , Steve VanRoekel , Tom Carper , Tom Coburn , budget , security clearances , ODNI , Jason Miller , Inside the Reporters Notebook