This program will provide a progress report on Big Data in government.
Cybersecurity isn’t what it used to be. The rise of social engineering, the internet of things, and the convergence of the cyber and physical worlds mean the old model of building a virtual moat around your network castle isn’t so much obsolete as having been rendered a subset of the complete cybersecurity mission.
This program will provide a progress report on Internet of Things (IoT) in government.
This program will provide a progress report on Cybersecurity/Defense & Homeland in government.
The world is full of risks. Federal agencies no less than commercial organizations, operating as they are in a complex and increasingly threatening world, face risks to their finances, their physical security, and their ability to do business thanks to vulnerabilities in their information technology systems.
Hear 11 top government thought leaders and visionaries discuss how they have used technology to accomplish mission needs and programs.
Federal News Radio convened a panel with a diverse group of cybersecurity professionals to talk about best practices for gathering threat intelligence for today’s cybersecurity in government.
As far back as 2007, it became common place for federal agencies and industry partners to talk about the need to better align data to improve the effectiveness and efficiency of the government.
This program will provide a progress report on Defense Cloud Computing in government.
This program will provide a progress report on Identity & Access Management in government.
Innovation and cybersecurity are in a head-on collision in the federal government. The growing use of connected devices under the moniker Internet of Things (IoT), the move to the cloud and what seems to be the ever growing expansion of mobile devices is causing government and industry alike to rethink how to be cyber secure, while also not stifling innovation at the same time.
There’s no doubt about it – the federal government has gone mobile. Driven by both policy and the compelling nature of mobile computing, smartphones and tablets have become daily tools at all levels of government. No longer just for email and phone calls, in the hands of line and management employees, mobile devices also carry enterprise applications and collaboration tools.
In late 2016 every eye in the political community is on the presidential change. A similar change will take place in the Pentagon – a massive upgrade of Microsoft Windows machines. Department of Defense Chief Information Officer Terry Halvorsen has mandated that four million computers be upgraded to Windows 10.
Derived Credentials have become an essential way for public sector agencies to leverage their investment in smart card based authentication and bring this capability to the mobile platform in a way that makes sense. As mobility heats up all over the federal workspace it’s important that a high level of security not be sacrificed. In support of this important effort, download our Mobileiron and Entrust Solution Brief to learn how we have worked together to provide an elegant, out of the box solution to solve this critical capability requirement, This solution makes it so any government organization can use their agency issued smart card to create a mobile credential to access important agency services like email, sharepoint & websites/microsites that require PIV card to access
The federal government has bought into cloud computing without a doubt. In a short seven years since the Obama administration’s cloud first policy, many agencies have quickly move past crawl to the walk stage and are ready to start running in the cloud.