Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
This program will provide a progress report on cybersecurity strategies in government.
Predicting the future is never easy, but it’s safe to say that work is becoming more mobile. At least, organizations including federal agencies are giving employees more leeway to work in an on-the-go way. And they’re deploying a growing number of enterprise applications onto mobile devices – smartphones and tablets.
For its federal IT strategy, the Trump administration is continuing the emphasis for the use of cloud computing as established during the previous administration. But cloud is a moving target for federal agencies.
What are the strategic priorities of Labor’s Office of Unemployment Insurance? How does the UI program work? What are improper payments and how has UI program sought to reduce them? Join us as we explore these questions with Gay Gilbert, Administrator, Office of Unemployment Insurance within the U.S. Department of Labor.
This program will provide a progress report on cybersecurity strategies in government.
Federal organizations carrying out important public missions have one important thing in common with large commercial entities; they are targets of unceasing cyberattacks. Managing successful attacks requires an up-to-date incident response mechanism that's capable of dealing with contemporary threats. It also requires a strategy to ensure incident management stays up-to-date.
Moving any enterprise to the cloud presents new challenges, particularly as data is moved off-premises. Over the last seven-plus years, agencies have faced many of those challenges as they decided what type of services in the cloud to implement.
In this episode of Market Chat!, we will talk with 3 federal executives to pick their brains on what really happens inside of a federal agency during the end-of-year buying season.
Criminals are getting better at hacking into cellphones or personal computers and getting through password-protected systems. Derived credentials offer safer and better ways to secure even the most sensitive federal agencies' systems and networks.
Important social challenges cross agency boundaries, and working effectively to solve these problems is not easy. Join us as we explore how New Zealand tackles these wicked challenges with Rodney Scott, co-author of the IBM Center report, Interagency Performance Targets: A Case Study of New Zealand’s Results Programme. How have Public Management Reforms evolved in New Zealand? What is the New Zealand Results Programme? What can other governments learn from the New Zealand experience?
Rick Driggers explains the NCIC leads nationwide efforts to detect, prevent, respond to and recover from cyber attacks, following procedures in the national response plan.
Tune in to FEDtalk this week for a discussion on the presidential appointment process, including the history of presidential appointments, and the possible risks associated with a historically slow risk of appointments, as well as a spate of acting appointments on which the clock is running out. August 4, 2017
The latest data on the Federal IT Dashboard shows agencies are spending almost 71 percent of their technology budgets on operations and maintenance and less than 21 percent on development, modernization and enhancements for systems.
Each week, it seems like another new and disturbing chapter emerges in the cybersecurity story. Agency security and IT personnel are finding effective strategies against these threats by sticking to and enhancing the basics. In this exclusive executive briefing, experts will explore advanced cyber monitoring