What are the IT priorities for the US Department of the Navy? How is the Navy leveraging mobility solutions? What is the US Navy doing to enhance its IT security. Join host Michael Keegan as he explores these questions and more with Rob Foster, Chief Information Officer, U.S. Department of the Navy.
During the far-ranging discussion, Ron Carback commented on the issues associated with not sharing information. If all agencies act as silos of information, we will see duplicated efforts across civilian and military agencies. This has many implications, including threats not being handled on a timely basis, the extra cost, and wasted talented when it comes to rebuilding.
What are the key priorities for HHS’ OIG? What are the top management and performance challenges facing HHS? What are the characteristics of an effective inspector general? Join host Michael Keegan as he explores these questions and more with Daniel Levinson, Inspector General of the U.S. Dept of Health and Human Services.
The viewpoint that RSA's chief technology officer Zulfikar Ramzan brought to the table is the ability to put the cybersecurity threat intelligence discussion within agencies in perspective with the commercial world. He reinforced the concept of a dichotomy in the world of threat intelligence. There is a balance in the need for trust and speed, but often times agencies require protracted reviews.
Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cybersecurity risk, particularly for government agencies, as it makes networks more susceptible to hacks and other forms of cyber-attacks.
What are Veterans Health Administration’s strategic priorities? What is VHA doing to improve its organizational performance? What is VHA doing to advance healthcare innovation for veterans and the country? Join host Michael Keegan as he explores these questions and more with Dr. David Shulkin, Under Secretary for Health, Veterans Health Administration, US Dept of Veterans Affairs.
Meet Jack and Zach. You may have seen them around in a variety of situations where Zach is happy and Jack is not. Why is that? Because Jack relies on aging, non-authorized infrastructure and service, that’s why! And while it might be funny to follow along with Jack and Zach’s exploits, here at Cisco we know that security is no laughing matter. We created Jack and Zach to get your attention about two major security concerns in the public sector: aging network infrastructure and non-FedRAMP-authorized cloud-based collaboration tools.
How to do enterprise cloud computing with high assurance
As more federal agencies move computing resources to the cloud – and they are – disaster recovery, data protection and assurance of availability of agency resources grow in importance.
Before agencies can adopt a new technology, the government must ensure that it meets their strict standards and is correctly deployed to maximize security.
The federal government is spending big bucks on connected technologies, otherwise known as the Internet of Things. Market research firm Govini estimated agencies spent almost $9 billion on these connected devices, with 56 percent of that increase on sensors alone.
What is the information technology strategy for the U.S. Environmental Protection Agency? How is the EPA modernizing its technology infrastructure and ensuring its IT investments align with its overall mission? What is the EPA doing to balanced stewardship of information and technology? Join host Michael Keegan as he explores these questions and more with Ann Dunkin, Chief Information Officer at the U.S. Environmental Protection Agency (EPA).
What is the U.S. Coast Guard strategic direction? How is the U.S. Coast Guard modernizing to be ready for today and prepared for tomorrow? Join host Michael Keegan as he explores these questions and more with Admiral Paul Zukunft, Commandant, United States Coast Guard.
Federal information technology professionals are swamped with new technologies. We see everything from big data, the cloud, smart phones, and the Internet of Things (IoT). Taken together, they may be manageable, but given the omnipresent threat of cyberattacks, the rapid rate of change makes the world of federal technology a difficult place to survive.
What are NASA’s key science priorities? What is NASA doing to promote Science, Technology, Engineering and Mathematics (STEM) education? When will we have definitive evidence of life outside of Earth? Join host Michael Keegan as they explore these questions with Dr. Ellen Stofan, NASA Chief Scientist.
What can government executives learn from the GAO’s high-risk list? What have agencies done over the years to get their programs off the list? How can programs stay off the list in the first place? Join host Michael Keegan as he explores these questions and more with Dr. Don Kettl, author of the IBM Center report, Managing Risk, Improving Results: Lessons for Improving Government Management from GAO’s High-Risk List.