Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
This content is sponsored by Brocade Federal Storage Networking Report
Insider threat: cybersecurity considerations when the walls will never be thick enough
Five technology experts collaborated to discuss cybersecurity in the federal government with a focus on insider threat. Members of the panel included Kerry Long, program manager at Intelligence Advanced Research Projects Activity (IARPA) in the Office of the Director of National Intelligence; Deborah Pierre-Louis, chief information security officer and director of the Policy, Liaison and Training Oversight Office, Directorate of the Deputy CIO for Information Assurance at the Department of State; Melinda Rogers, chief information security officer at the Department of Justice; and Tim Estes, founder and CEO of Digital Reasoning.
What are the strategic priorities for FBI’s Criminal Justice Information Services (CJIS) Division? How does the FBI’s CJIS Division foster information sharing across the law enforcement enterprise? Join us as we explore these questions and more with Stephen Morris, Assistant Director, FBI’s Criminal Justice Information Services (CJIS) Division.
In this Expert Edition, you'll read which agencies are working on the cutting edge to make government-to-government and citizen-to-government transactions simpler and safer in the modern digital age.
Dr. Allison Druin, Special Advisor for National Digital Strategy at the National Park Service (NPS), joined Federal News Radio’s In Focus to share how the agency is using science and technology to enhance the public’s experience. The NPS was founded a century ago and now totals 413 parks. Dr. Druin discussed some of the challenges in how the NPS works to preserve this remarkable heritage as well as looking to the future. For her, one key is to understand the visitor experience and what will matter to the public. To this end, the NPS has looked at many tools, including mobile, cloud, wearables, and other approaches that will give the typical visitor a better understanding of that particular park. In a perfect world, the NPS will make the visit more meaningful both today and in the future.
Today’s applications are increasingly complex, and they are critical for meeting agency mission objectives. At the same time, agencies continue moving toward shared services models. Does running these bandwidth-intensive, latency-sensitive applications and data on a shared IP storage network put storage performance, availability, and data security at risk?
What are benefits of pursuing enterprise risk management? How can risk management enhance department decision-making? How are you fostering a culture of risk awareness across an enterprise? Join us as we explore these questions and more with Dr. Karen Hardy, Deputy Director for Risk Management at the U.S. Department of Commerce.
This program will provide a progress report on DevOps and Containerization in government.
This program will provide a progress report on DevOps and Containerization in government.
Help the National Park Service celebrate its 100th birthday in 2016! August 19, 2016
Four leading government marketing pros offer tips and insights on how to strengthen your government marketing efforts. Topics include events, budgets, brand vs. lead gen, GAIN 2016, mentoring, and more.
This edition of the Business of Government magazine highlights strong leaders with the right talent who are charged with executing the business of government. Join host Michael Keegan as he tells the stories of such leaders as Anne Rung, Admiral Paul Zukunft, Dr. Reggie Brothers, Dr. David Bray, and LaVerne Council, outlines their collective challenges, illustrates their respective successes, shares the lessons they have learned – and ultimately, explore how best to help these leaders be effective.
Over the past 20 years, some would say the specific approach to cybersecurity taken by the government and industry has been shortsighted. The defense-in-depth approach is broken, according to some experts. They say it creates a false sense of security. It depends on too many point solutions at different layers of the network. In the end, it creates gaps and that is where hackers hide and eventually breach the network and take the data.
This program will provide a progress report on cybersecurity strategies in government.