Innovation and cybersecurity are in a head-on collision in the federal government. The growing use of connected devices under the moniker Internet of Things (IoT), the move to the cloud and what seems to be the ever growing expansion of mobile devices is causing government and industry alike to rethink how to be cyber secure, while also not stifling innovation at the same time.
What is the U.S. Coast Guard strategic direction? How is the U.S. Coast Guard modernizing to be ready for today and prepared for tomorrow? Join host Michael Keegan as he explores these questions and more with Admiral Paul Zukunft, Commandant, United States Coast Guard.
Tune in to FEDtalk this week for a look into the Human Exploitation Rescue Operative program and its efforts in rescuing and protecting exploited children. October 21, 2016
Federal information technology professionals are swamped with new technologies. We see everything from big data, the cloud, smart phones, and the Internet of Things (IoT). Taken together, they may be manageable, but given the omnipresent threat of cyberattacks, the rapid rate of change makes the world of federal technology a difficult place to survive.
This article is sponsored by Cipher Systems The New York Times recently published the story of yet another government contractor accused of stealing classified information from the National Security Agency. Unlike the widely publicized incident with…
What are NASA’s key science priorities? What is NASA doing to promote Science, Technology, Engineering and Mathematics (STEM) education? When will we have definitive evidence of life outside of Earth? Join host Michael Keegan as they explore these questions with Dr. Ellen Stofan, NASA Chief Scientist.
Online chat with Tonya Ugoretz, the director of the Cyber Threat Intelligence Integration Center.
There’s no doubt about it – the federal government has gone mobile. Driven by both policy and the compelling nature of mobile computing, smartphones and tablets have become daily tools at all levels of government. No longer just for email and phone calls, in the hands of line and management employees, mobile devices also carry enterprise applications and collaboration tools.
What can government executives learn from the GAO’s high-risk list? What have agencies done over the years to get their programs off the list? How can programs stay off the list in the first place? Join host Michael Keegan as he explores these questions and more with Dr. Don Kettl, author of the IBM Center report, Managing Risk, Improving Results: Lessons for Improving Government Management from GAO’s High-Risk List.
In this Expert Edition, you'll read about the current initiatives and upcoming policy changes needed to address the ever-growing IT and application modernization challenge.
Tune in to FEDtalk this week for a preview of NLEOMF’s upcoming charity race, Run for the Badge, and an update on what FLEOA’s current initiatives! October 7, 2016
In late 2016 every eye in the political community is on the presidential change. A similar change will take place in the Pentagon – a massive upgrade of Microsoft Windows machines. Department of Defense Chief Information Officer Terry Halvorsen has mandated that four million computers be upgraded to Windows 10.
This program will provide a progress report on Data Center Consolidation & Optimization Strategies in government.
Derived Credentials have become an essential way for public sector agencies to leverage their investment in smart card based authentication and bring this capability to the mobile platform in a way that makes sense. As mobility heats up all over the federal workspace it’s important that a high level of security not be sacrificed. In support of this important effort, download our Mobileiron and Entrust Solution Brief to learn how we have worked together to provide an elegant, out of the box solution to solve this critical capability requirement, This solution makes it so any government organization can use their agency issued smart card to create a mobile credential to access important agency services like email, sharepoint & websites/microsites that require PIV card to access
What are the key strategic priorities for the US Customs and Border Protection? What is CBP doing to be more efficient and effectively in meeting its mission? How is CBP pursuing innovative security strategies? Join host Michael Keegan as he explores these questions and more with Kevin McAleenan, Deputy Commissioner of U.S. Customs and Border Protection on the next The Business of Government Hour.