With the increasingly frequent and diverse nature of cyber attacks, organizations including federal agencies have put a lot of effort into advanced detecting and deeper understanding these threats. “Now,” says Ian Doyle, executive security advisor at IBM Federal, “we’re really seeing the pendulum swing to more response actions.”
Getting to full benefit of cloud deployments means substantial reengineering of applications, as opposed to simply the lift-and-shift approach. But Chad Sheridan, the chief information officer of the Agriculture Department’s Risk Management Agency, says federal agencies aren’t quite there yet.
What is the US Customs and Border Protection's national strategy to facilitate legitimate trade? How is CBP strengthening comprehensive trade enforcement? What are the biggest disruptions coming to trade? Join host Michael Keegan on The Business of Government Hour as he explores these questions and so much more with Brenda Smith, Executive Assistant Commissioner, Office of Trade, U.S. Customs and Border Protection.
Peter Tran, the general manager and senior director for worldwide advanced cyber defense practice at RSA, takes what he calls an edgier view of cybersecurity than the average cat.
When it comes to continuous monitoring for cybersecurity – and its companion strategy of continuous diagnostics and mitigation – federal agency practitioners need to be realistic about how they apply the words “monitoring” and “continuous.”
What is the Food and Drug Administration’s IT strategy? How is FDA changing the way it does IT? What is FDA doing to leverage the advances of mobile technologies? Join host Michael Keegan next week as he explores these questions and more with Todd Simpson, Chief Information Officer, at the US Food and Drug Administration.
Today’s cybersecurity threat landscape has completely changed from the years where a Common Access Card (CAC) or Personal Identity Verification (PIV) card could provide reasonable security. For example, in 2015 the United States Central Command Twitter account was hacked. The Department of Defense has limited ways to secure this resource well beyond any kind of current identity control.
Dr. Barry West has a title that means business. As senior advisor and senior accountable official for risk management at the Homeland Security Department, he basically has the job of seeing that the Trump administration executive order on cybersecurity is carried out at DHS.
Paul Battaglia, the vice president of federal sales for Blackberry, said agencies want a single “pane of glass” to monitor the cyber posture of all of their mobile devices from laptops to smartphones to wearables.
In this exclusive executive briefing, experts will explore the current state of the federal cloud situation.
What are the key priorities for the NIH Information Technology Acquisition and Assessment Center, NITAAC? How does NITAAC assist federal agencies to accomplish their mission? Join host Michael Keegan as he explores these questions with Bridget Gauer, Acting Director of NITAAC.
Storage has always been a time consuming issue for federal information professionals. Changes to virtualization have enabled current system administrators to be much more flexible in assigning storage. Not only does this make life easier for management, but it also increases efficiency, improves security, and enables easier deployment of Virtual Desktop Infrastructure (VDI).
What are the strategic priorities for the Defense Health Agency’s Component Acquisition Executive? How is DHA changing the way it acquires products and services? Join host Michael Keegan this week on The Business of Government Hour as he explores these questions with Dr. Barclay P. Butler, Component Acquisition Executive at the Defense Health Agency.
How does the Federal Acquisition Service (FAS) push efficient and effective IT buying practices through category management? What is FAS doing to help agencies make the best acquisition decisions? How is GSA transforming the way professional services are acquired? Join host Michael Keegan next week as he explores these questions and more with Tiffany Hixson, Regional Commissioner Northwest/Arctic, Federal Acquisition Service within U.S. General Services Administration (GSA).
In this exclusive executive briefing, government and industry experts will explore reducing insider threat through good policy, technology and human analysts.