Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
What are the strategic priorities for the Defense Health Agency’s Component Acquisition Executive? How is DHA changing the way it acquires products and services? Join host Michael Keegan as he explores these questions with Dr. Barclay P. Butler, Component Acquisition Executive at the Defense Health Agency.
For Sean Lang, chief information security officer for the Library of Congress, email security is both an internal and external matter.
How can technology transform the way government does business? How can the federal government reduce costs and improve services by adapting private sector cost reduction strategies and technologies? What are those specific cost reduction strategies? Join us as we explore these questions and more.
For Bhagwat Swaroop, executive vice president and general manager for email security at Proofpoint, use of the DMARC protocols is a matter of maintaining trust within an organization, among agencies, and between agencies and external constituents.
Ping Look, the executive advisor for security and awareness at Optiv, says assurance in the authenticity of received email is becoming more difficult.
Jeff Fossum, senior vice president at Booz Allen Hamilton, said agencies need to take a holistic view of their digital transformation effort, or face new systems or processes that miss the mark.
Laura Grant and David Vernon, both of SAP, say agencies need to adopt innovation platforms, not just new technology.
RSA Senior Director Peter Tran encourages agencies to take a risk-based approach to cybersecurity.
When it comes to protecting the government's IT infrastructure from cyberattacks, conventional wisdom has long held that modernization of outdated legacy systems can be a key driver of improved security. The results of a survey released Sept. 6 challenged that conventional wisdom. The poll, conducted by Unisys found that a majority of federal IT leaders believe modernization efforts have increased, not decreased, their overall security challenges
What role does fire play in shaping natural resource land management? How does Interior’s Office of Wildland Fire work to suppress wildland fire? What is being done to reduce the risks to first responders and the public? Join host Michael Keegan as he explores these questions and more with Bryan Rice, Director of the Office of Wildland Fire, Department of the Interior.
How do we ensure systems on government networks are in a completely known, secure state once they are in production?
Even the highest quality and most innovative solutions fail if they are not ultimately adopted by end users. Designing IT solutions that users want is not a single act, but a series of acts that create memorable experiences and drive real usage from the target audience. It is only when intended users use the full capabilities provided by a technology solution that an organization gets a return on its technology investment – it is as simple as that.
Federal information technology executives are tasked with managing the data inundation and cyber threats they encounter on a daily basis, often with limited resources, both from a budgetary and skilled personnel perspective. Federal News Radio recently spoke with Steve Hull, chief information officer at Leidos, to address these issues and more.
To explore the latest thinking in the data strategies of federal agencies, Federal News Radio convened a panel of chief data officers, CIOs, and people from industry to discuss use cases, how to deal with diverse data, governance issues, and some technology solutions to carry out data strategies.