ASMC The Business of Defense

  • John Kunzier Director, Global Portfolio Marketing Unisys John Kunzier is the director of Global Portfolio Marketing, focusing on mission critical and high availability computing on legacy solutions and standard operating environments, including Linux and Windows.…

    January 24, 2014
  • Jason Kimrey is the Director of Federal Sales for Intel Corporation. He currently leads a business development team responsible for working throughout the US Government to address mission requirements of Defense and Civilian agencies through the use of leading edge technologies. Jason has held various Sales and Marketing positions throughout his 13 year career at Intel. Prior to Intel, Jason worked extensively in the government and healthcare industries at EDS and NY Life. He holds a Bachelor of Science from James Madison University and an MBA from the University of Georgia.

    January 24, 2014
  • The Administration's establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of Cloud Computing Brokerage, a means to integrate software-as-a-service economically with the agility and flexibility the agency needs.

    January 23, 2014
  • What are the challenges to interagency coordination? How can federal agencies enhance interagency coordination? What lessons can be learned from interagency coordination in Afghanistan? Join host Michael Keegan as he explores these questions and more with Andrea Strimling Yodsampa, author of the IBM Center report, Coordinating for Results: Lessons from a Case Study of Interagency Coordination in Afghanistan. Dr. Andrea Strimling Yodsampa Senior Researcher/Program Manager Tufts University The Fletcher School

    January 23, 2014
  • A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.

    January 23, 2014
  • The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.

    January 22, 2014
  • Dolly Oberoi, CEO of C2-Technolgies, will discuss online training and how the federal government can use it to reduce costs and improve benefits. January 21, 2014

    January 21, 2014
  • How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

    January 21, 2014
  • How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

    January 21, 2014
  • Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

    January 21, 2014
  • Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

    January 21, 2014
  • The Pentagon says it's sending Iraq another installment of small arms and ammunition requested by Baghdad as it battles al-Qaida militants for control of Fallujah and other key cities in Anbar province. A Pentagon spokesman said Friday that Iraq will be receiving the extra arms and ammunition "very shortly." Army Col. Steve Warren declined to say whether Washington is considering using U.S. troops to train Iraqi forces.

    January 21, 2014
  • The European Union is expected soon send up to 1,000 soldiers to help stabilize Central African Republic. It would be the EU's first major army operation in six years. Reuters says, "the intervention by the 28-nation bloc comes after a senior U.N. official warned on Thursday of the risk of genocide in Central African Republic without a more robust international response to communal bloodshed."

    January 21, 2014
  • In one of her last interviews as GSA CIO, Casey Coleman joins Michael Keegan on The Business of Government Hour to reflect on her tenure at GSA. The discussion explores GSA's IT priorities, its IT challenges, successes, innovations, and offers insights on federal IT trends. Chief Information Officer U.S. General Services Administration

    January 21, 2014