What role does fire play in shaping natural resource land management? How does Interior’s Office of Wildland Fire work to suppress wildland fire? What is being done to reduce the risks to first responders and the public? Join host Michael Keegan as he explores these questions and more with Bryan Rice, Director of the Office of Wildland Fire, Department of the Interior.
Wally Coggins, the director of the IC Security Coordination Center in the Office of the Director of National Intelligence, has a full plate this year. He says that in the dynamic threat environment, he and his staff are working on three initiatives.
Lawrence Reed, the assistant director for security operations at the Justice Department, says the government needs to up its game when it comes to endpoint security, especially mobile end point.
As government IT seeks ways to be more innovative and responsive to keep up with increasing workloads and demands, open hybrid cloud offers hope as a means to meet growing mission challenges.
What is the US Air Force’s Information Dominance Strategy? How is the Air Force changing the way it does IT? What is the US Air Force doing to leverage advances of mobile technologies? Join host Michael Keegan as he explores these questions and more with Bill Marion, Deputy Chief, Information Dominance & Deputy Chief Information Officer, U.S. Air Force.
Jeff Wichman, the practice director for enterprise incident management at Optiv, says the government is doing a “bang up job if effectively responding to cybersecurity incidents.
With the increasingly frequent and diverse nature of cyber attacks, organizations including federal agencies have put a lot of effort into advanced detecting and deeper understanding these threats. “Now,” says Ian Doyle, executive security advisor at IBM Federal, “we’re really seeing the pendulum swing to more response actions.”
Getting to full benefit of cloud deployments means substantial reengineering of applications, as opposed to simply the lift-and-shift approach. But Chad Sheridan, the chief information officer of the Agriculture Department’s Risk Management Agency, says federal agencies aren’t quite there yet.
What is the US Customs and Border Protection’s national strategy to facilitate legitimate trade? How is CBP strengthening comprehensive trade enforcement? What are the biggest disruptions coming to trade? Join host Michael Keegan on The Business of Government Hour as he explores these questions and so much more with Brenda Smith, Executive Assistant Commissioner, Office of Trade, U.S. Customs and Border Protection.
Peter Tran, the general manager and senior director for worldwide advanced cyber defense practice at RSA, takes what he calls an edgier view of cybersecurity than the average cat.
When it comes to continuous monitoring for cybersecurity – and its companion strategy of continuous diagnostics and mitigation – federal agency practitioners need to be realistic about how they apply the words “monitoring” and “continuous.”
What is the Food and Drug Administration’s IT strategy? How is FDA changing the way it does IT? What is FDA doing to leverage the advances of mobile technologies? Join host Michael Keegan next week as he explores these questions and more with Todd Simpson, Chief Information Officer, at the US Food and Drug Administration.
Today’s cybersecurity threat landscape has completely changed from the years where a Common Access Card (CAC) or Personal Identity Verification (PIV) card could provide reasonable security. For example, in 2015 the United States Central Command Twitter account was hacked. The Department of Defense has limited ways to secure this resource well beyond any kind of current identity control.
Dr. Barry West has a title that means business. As senior advisor and senior accountable official for risk management at the Homeland Security Department, he basically has the job of seeing that the Trump administration executive order on cybersecurity is carried out at DHS.
Paul Battaglia, the vice president of federal sales for Blackberry, said agencies want a single “pane of glass” to monitor the cyber posture of all of their mobile devices from laptops to smartphones to wearables.