ASMC The Business of Defense

  • How do you delivery healthcare anywhere at anytime? What are the strategic priorities for the military health system? How has MHS sought to address some of the critical challenges it faces? Join host Michael Keegan as he explores these questions and more with Dr. Karen Guice, Acting Assistant Secretary of Defense for Health Affairs within the U.S. Department of Defense.

    December 19, 2016
  • From Shaun's perspective, if an agency has just discovered a zero-day threat it is about a day too late. Policies should be in place that can immediately respond to threats. Shaun also addressed budgeting and suggested that perhaps the constant refrain of increasing resources should be balanced with leveraging existing investments. Many agencies may feel secure if they comply with all the rules and regulations from security agencies, but the truth is that compliance may not be enough to prevent attacks.

    December 16, 2016
  • Tune into FEDtalk this week for a discussion on the latest presidential transition books to hit the shelves. December 16, 2016

    December 16, 2016
  • Hear 11 top government thought leaders and visionaries discuss how they have used technology to accomplish mission needs and programs.

    December 13, 2016
  • Hear 11 top government thought leaders and visionaries discuss how they have used technology to accomplish mission needs and programs.

    December 12, 2016
  • What is the Precision Medicine Initiative (PMI) Cohort Program? How do you balance accessibility and data security of cohort participants? How do you manage expectations? Join host Michael Keegan as he explores these questions and more with Eric Dishman, Director, Precision Medicine Initiative (PMI) Cohort Program, National Institutes of Health.

    December 12, 2016
  • Tim Ruland’s background gives him a practical edge to the cybersecurity threat intelligence discussion. During the interview, he talked about the practical aspects of gaining a better understanding of cybersecurity threat intelligence. It's important to set priorities, which is commonly referred to as "orchestration." Terrific in theory, but one must select the correct tools to combine these prioritized tasks properly. In response to Zulfikar Ramzan’s statement about 1400 new cybersecurity companies coming on the market in the past year, Tim talked about the difficulty of picking the correct vendor for due to specific needs.

    December 09, 2016
  • What are the IT priorities for the US Department of the Navy? How is the Navy leveraging mobility solutions? What is the US Navy doing to enhance its IT security. Join host Michael Keegan as he explores these questions and more with Rob Foster, Chief Information Officer, U.S. Department of the Navy.

    December 05, 2016
  • During the far-ranging discussion, Ron Carback commented on the issues associated with not sharing information. If all agencies act as silos of information, we will see duplicated efforts across civilian and military agencies. This has many implications, including threats not being handled on a timely basis, the extra cost, and wasted talented when it comes to rebuilding.

    December 02, 2016
  • Tune in to FEDtalk this week for an inside look at the Open Season Virtual Benefits Fair, plus hear from Blue Cross Blue Shield Association about their best FEHB offerings during Open Season. December 2, 2016

    December 01, 2016
  • Federal News Radio convened a panel with a diverse group of cybersecurity professionals to talk about best practices for gathering threat intelligence for today’s cybersecurity in government.

    November 28, 2016
  • What are the key priorities for HHS’ OIG? What are the top management and performance challenges facing HHS? What are the characteristics of an effective inspector general? Join host Michael Keegan as he explores these questions and more with Daniel Levinson, Inspector General of the U.S. Dept of Health and Human Services.

    November 28, 2016
  • The viewpoint that RSA's chief technology officer Zulfikar Ramzan brought to the table is the ability to put the cybersecurity threat intelligence discussion within agencies in perspective with the commercial world. He reinforced the concept of a dichotomy in the world of threat intelligence. There is a balance in the need for trust and speed, but often times agencies require protracted reviews.

    November 22, 2016
  • Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cybersecurity risk, particularly for government agencies, as it makes networks more susceptible to hacks and other forms of cyber-attacks.

    November 22, 2016