In this episode of Market Chat!, we will talk with 3 federal executives to pick their brains on what really happens inside of a federal agency during the end-of-year buying season.
Criminals are getting better at hacking into cellphones or personal computers and getting through password-protected systems. Derived credentials offer safer and better ways to secure even the most sensitive federal agencies' systems and networks.
Important social challenges cross agency boundaries, and working effectively to solve these problems is not easy. Join us as we explore how New Zealand tackles these wicked challenges with Rodney Scott, co-author of the IBM Center report, Interagency Performance Targets: A Case Study of New Zealand’s Results Programme. How have Public Management Reforms evolved in New Zealand? What is the New Zealand Results Programme? What can other governments learn from the New Zealand experience?
Rick Driggers explains the NCIC leads nationwide efforts to detect, prevent, respond to and recover from cyber attacks, following procedures in the national response plan.
Tune in to FEDtalk this week for a discussion on the presidential appointment process, including the history of presidential appointments, and the possible risks associated with a historically slow risk of appointments, as well as a spate of acting appointments on which the clock is running out. August 4, 2017
The latest data on the Federal IT Dashboard shows agencies are spending almost 71 percent of their technology budgets on operations and maintenance and less than 21 percent on development, modernization and enhancements for systems.
Each week, it seems like another new and disturbing chapter emerges in the cybersecurity story. Agency security and IT personnel are finding effective strategies against these threats by sticking to and enhancing the basics. In this exclusive executive briefing, experts will explore advanced cyber monitoring
Adilson Jardim, the area vice president for Splunk Public Sector Sales Engineering, said agencies can increase visibility into their networks and ensure apps are secure by implementing the agile methodology.
ViON’s Rob Davies and Kaminario’s Josh Epstein cited companies’ scalable, agile technologies as drivers for change in federal government.
Many agencies are considering moving to the cloud. This transition is more than a “lift and shift” to one of the major cloud offerings. Merlin International and NetApp have combined to help you take advantage of the hybrid cloud. The good news is that a hybrid cloud will give federal information systems possibilities they didn’t have before; the bad news is, one must examine systems carefully before a transition is made.
What is public health surveillance? How do emerging health information technologies improve public health data? How is the Centers for Disease Control and Prevention using innovation solutions to tackle public health surveillance challenges? Join us as we explore these questions with Brian Lee, Chief Public Health Informatics Officer within the Office of Public Health Scientific Services at CDC.
In this exclusive executive briefing, experts will explore the current state of the federal cloud situation.
Rick Howard, the chief security officer for Palo Alto Networks, said the cybersecurity consumption model will be disrupted by orchestration and automation in the cloud.
As one, albeit large, component in Homeland Security, the Transportation Security Administration works in concert with other components as it also worked to ensure its own mission continuity. Namely, keeping the nation’s airports and hundreds…
This program will provide a progress report on secure mobility solutions in government.