Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Documents obtained by Federal News Radio show VA's financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
Documents obtained by Federal News Radio show VA failed for the 15th year in a row its consolidated financial statement audit with regard to security controls.
Ty Cooper, the OGE chief information officer, said a new voice over IP, virtual desktop interface and the move to Windows 7 will enable employees to take advantage of more workplace capabilities.
GSA says its problem-plagued System for Award Management is now working, but its failures have pushed agency officials to pursue a new path to consolidate the government's approach to procurement data.
The Homeland Security Department's CIS is using a continuous delivery model where it automates reviews of software code to ensure security and quality. DHS is using a similar approach for mobile apps called the Carwash, where it's checking the code to compliance with specific requirements.
Kevin Kelly, CEO of LGS Innovations, will discuss how his company can help improve network security at your agency.
December 17, 2013
You've heard of email and snail mail - but what about jail mail? It is something that will soon be on the way to some inmates at the Pasco County Jail in Florida. Sheriff Chris Nocco says 77 kiosks are being set up in the jail housing units. The set-ups will let inmates read and send email to those who have approved accounts. The sheriff says there will be no cost to taxpayers for the service. While inmates will be able to get email and photos, they will only be able to send email, not photos. And - as is the case with regular mail, deputies will be monitoring inmates email.
A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat. Theodore H. Moran, a professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.
Tell us how you use Twitter, Facebook, LinkedIn and Flickr and what you'd like to see on social media from Federal News Radio.
An interagency review group determined having one leader for both organizations makes the most sense to get the mission done.
The Air Force's Service Development and Delivery Process aims to deliver data hosting, enterprise management, security and other IT functions as standards-based services to be used by the entire organization.
Crunch time: Health care sign-ups picked up in November but still far short as deadline nears
The annual policy legislation also doesn't merge the DoD CIO and deputy chief management officer.
Employees at the departments of Treasury, Homeland Security and State can use their HSPD-12 smart cards to log onto the intelligence community's unclassified sharing platform. Most recently, the departments of Health and Human Services, Veterans Affairs and the Justice Department's Bureau of Alcohol, Tobacco, Firearms and Explosives will have access to the tools and applications through their smart identity cards.
Paul Christman, vice president Public Sector at Dell Software, discusses how his company can help you solve identity management issues at your agency.
December 10, 2013
More than a dozen industry technology and business groups are asking the House to adopt language in the Senate's Commerce, Justice, Science appropriations bill that would focus on risk when buying technology products and services from companies that have connections to China.
Bernie Mazer, the Interior Department's chief information officer, said among his top priorities are data center consolidation, cloud hosting, cybersecurity and strategic sourcing. He said the goal is to let the bureau level IT executives focus on mission and not worry about commodity IT.
Seven months after the White House issued a new policy and executive order, some agencies have met the requirements to release their data inventories and create a "/data" page. But many agencies have yet to follow through on the milestones.
Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues.
December 9, 2013
Inside the Reporter's Notebook: Labor pinched by poor cloud contracting; Financial shared services progresses
News and buzz in the acquisition and IT communities that you may have missed this week.