What are the challenges of acquiring complex products? What lessons can be learned from the Coast Guard’s Deepwater program? How can government executives most effectively manage complex acquisitions? Join host Michael Keegan as he explores these questions through the works of Trevor Brown and David Van Slyke, authors of several IBM Center reports on federal acquisition.
As National Cybersecurity Assessment and Technology Services lead at the Homeland Security Department’s National Protection and Programs Directorate, Cameron Dixon has been close to the six Binding Operational Directives coming from DHS in recent years.
Federal News Radio brought together a panel of civilian agency technology executives from across the federal government with two Red Hat experts to assess the state of the hybrid cloud.
Keith Salisbury, the senior director of federal sales for Pivotal, said leadership is key to build software at startup speed.
What are the strategic priorities for the Defense Health Agency’s Component Acquisition Executive? How is DHA changing the way it acquires products and services? Join host Michael Keegan as he explores these questions with Dr. Barclay P. Butler, Component Acquisition Executive at the Defense Health Agency.
For Sean Lang, chief information security officer for the Library of Congress, email security is both an internal and external matter.
How can technology transform the way government does business? How can the federal government reduce costs and improve services by adapting private sector cost reduction strategies and technologies? What are those specific cost reduction strategies? Join us as we explore these questions and more.
For Bhagwat Swaroop, executive vice president and general manager for email security at Proofpoint, use of the DMARC protocols is a matter of maintaining trust within an organization, among agencies, and between agencies and external constituents.
Ping Look, the executive advisor for security and awareness at Optiv, says assurance in the authenticity of received email is becoming more difficult.
Jeff Fossum, senior vice president at Booz Allen Hamilton, said agencies need to take a holistic view of their digital transformation effort, or face new systems or processes that miss the mark.
Laura Grant and David Vernon, both of SAP, say agencies need to adopt innovation platforms, not just new technology.
RSA Senior Director Peter Tran encourages agencies to take a risk-based approach to cybersecurity.
When it comes to protecting the government's IT infrastructure from cyberattacks, conventional wisdom has long held that modernization of outdated legacy systems can be a key driver of improved security. The results of a survey released Sept. 6 challenged that conventional wisdom. The poll, conducted by Unisys found that a majority of federal IT leaders believe modernization efforts have increased, not decreased, their overall security challenges
What role does fire play in shaping natural resource land management? How does Interior’s Office of Wildland Fire work to suppress wildland fire? What is being done to reduce the risks to first responders and the public? Join host Michael Keegan as he explores these questions and more with Bryan Rice, Director of the Office of Wildland Fire, Department of the Interior.
How do we ensure systems on government networks are in a completely known, secure state once they are in production?