Transcribed Videos
-
Brendan Goode: That's a tough question, because we've had several successes at the department over the past year. I'd like to pick one that's…
Cybersecurity-Programs-DHS-Jan. 14
From Kevin Jackson
38 plays 0 -
Roland Fabia: For us in DIA, it’s the intelligence community information technology enterprise or iSight, and I know you’ve had Director Clapper and other…
DIA-Info & Intell Sharing-Priorities-May 2014
From Kevin Jackson
35 plays 0 -
Ltg Ed Cardon: So Jim we’ll just highlight four areas. JIm Flyzik: Okay. Ltg Ed Cardon: So first, we've created a global standardized security posture. So…
Cybersecurity-Progress-US Army-Jan. 14
From Kevin Jackson
35 plays 0 -
Dave Bottom: Sure, Jim. We take a look at NGA (National Geospatial Intelligence Agency), we're using big data in a couple of different ways. JIm Flyzik: Okay. …
Big Data- Profiles-NGA-March 2014
From Kevin Jackson
24 plays 0 -
Gail Kalbfleisch: The Federal Architecutual vision is that wonderful vision. It's to support the development of the health technology environment that's fully…
Health IT-Vision-HHS-July 2014
From Kevin Jackson
24 plays 0 -
Ltc. Paul Stanton: Again, from the army side perspective, we are focused on operations and mission impact and we are very closely partnered with DISA in pursuing cloud…
Secure Cloud Computing-Profiles-Army-May 2014
From Kevin Jackson
24 plays 0 -
Brendan Goode: Certainly the threat doesn’t go away. JIm Flyzik: Yeah. Brendan Goode: I think there’s too much of a reward for people that are successful.…
Cybersecurity-Vision-DHS-Jan. 14
From Kevin Jackson
22 plays 0 -
David Bennett: Take that is absolutely on target. The identity piece of this is going to be key as we move forward as we put enterprise email into place. We created…
Defense Cloud Computing-Security-DISA-Part 3 Nov.…
From Kevin Jackson
21 plays 0 -
Richard Marcell: Right, Jim. So I’m going to go on from [00:00:02]. I guess he really captured quite well what our experiences have been to. So first of all,…
Continuous Monitoring-Lessons Learned-Army-June…
From Kevin Jackson
21 plays 0 -
Ltg Ed Cardon: Being in the Army, you don’t win on the defense, right? And so – because the problem is you know you have to be right a hundred out of a…
Cybersecurity-Vision-US Army-Jan. 14
From Kevin Jackson
18 plays 0 -
Rick Holgate: You know and it’ll actually be hard just to pick one. Frankly, yeah, and I alluded to some of them earlier. I think, you know, veterans’…
Mobility in Gov-Profiles-ATF-March 2014
From Kevin Jackson
18 plays 0 -
Dave Bowen: A number of my colleagues have already stolen my points. JIm Flyzik: That is the danger going last. Dave Bowen: Actually that may be a benefit, but one…
Health IT-Vision-DHA-July 2014
From Kevin Jackson
17 plays 0 -
Secure Cloud Computing-Benefits-Army-May 2014 13 of 24
Secure Cloud Computing-Benefits-Army-May 2014
Ltc. Paul Stanton: Absolutely. So here goes way beyond cost settings from an army side perspective. It is all about our ability to see the operational domain, the…Secure Cloud Computing-Benefits-Army-May 2014
From Kevin Jackson
17 plays 0 -
A couple of things. I think it’s really great points everybody’s made, but also really improved its speed of decision making for every government employee…
GSA-Big Data Benefits-March 2014
From Kevin Jackson
16 plays 0 -
Shishu Gupta: Thanks for having us on Scrape Program, it’s a pleasure to talk to you and your listeners. Yeah, NGA is part of the intelligence community that works…
Secure Cloud Computing-Progress-NGA-May 2014
From Kevin Jackson
16 plays 0 -
Ltg. Ed Cardon: Well this sector of the army has been pretty clear on mission to defend all the army networks and build them, what Jason had said, you know, often people…
Army-Cybersecurity-Priorities-Jan. 14
From Kevin Jackson
16 plays 0 -
Brendan Goode: Sure. First of all, it’s always fun doing these panels because you continue to see common themes being shared. JIm Flyzik: Really, yeah. I’m…
DHS-Cybersecurity-Priorities-Jan. 14
From Kevin Jackson
15 plays 0 -
Secure Cloud Computing-Security-Army-May 2014 18 of 24
Secure Cloud Computing-Security-Army-May 2014
Ltc Paul Stanton: Yes, sir. It’s a huge concern for us. As we move towards a goal of creating a virtually consolidated data store, we have to consider the threat…Secure Cloud Computing-Security-Army-May 2014
From Kevin Jackson
13 plays 0 -
Shishu Gupta: Yes, I mentioned that common desk top. So the first one that we created is a virtualized environment, where everything is [00:00:07 Inaudible] so all of…
Secure Cloud Computing-Profiles-NGA-May 2014
From Kevin Jackson
13 plays 0 -
Kshemendra Paul: So 3 things… JIm Flyzik: Okay. Kshemendra Paul: Number 1 is we want to do more to strengthen the management practices across agencies to better…
ODNI -Info & Intell Sharing-Priorities-May…
From Kevin Jackson
12 plays 0 -
Secure Cloud Computing-Progress-Army-May 2014 21 of 24
Secure Cloud Computing-Progress-Army-May 2014
Ltc. Paul Stanton: Yes, sir. I appreciate the opportunity. From an army cyber perspective we are leveraging cloud technology to support network operations and in cyber…Secure Cloud Computing-Progress-Army-May 2014
From Kevin Jackson
12 plays 0 -
Brendan Goode: Sure. Cybersecurity is a problem that if you allow the scaling complexity to overwhelm you, it can quickly. And capacity is an issue behind that as…
Cybersecurity-Challenges-DHS-Jan. 14
From Kevin Jackson
12 plays 0 -
Radm Marshall Lytle: Sure Jim. There’s certainly lots to talk about in this domain. It’s very fast moving, things are changing, very complex. The DODs IT…
Cybersecurity-Progress-US Cyber Command-Jan. 14
From Kevin Jackson
12 plays 0 -
Kshemendra Paul: Yeah, that’s great, Jim. I want to highlight project interoperability. What we’ve done with project interoperability is take what we think…
Info & Intell Sharing-Profiles-ODNI-May 2014
From Kevin Jackson
11 plays 0