|
|
|
|
|
|
|
Kshemendra Paul: Yeah, that’s great, Jim. I want to highlight project interoperability. What we’ve done with project interoperability is take what we think of as the greatest hits of the…
|
|
Roland Fabia: Within DIA, through a DIA initiative, they created a program called Analyst Space or A-Space.
JIm Flyzik: Mm hmm.
Roland Fabia: And made DIA the executive agent for that. And Analyst…
|
|
Zach Goldstein: The specific program that we hope to make a big difference. JIm Flyzik: Okay. Zach Goldstein: It's the newest thing we've got and I'm so glad that Tom at NASA…
|
|
Dave Bottom: Sure, Jim. We take a look at NGA (National Geospatial Intelligence Agency), we're using big data in a couple of different ways. JIm Flyzik: Okay. Dave Bottom: The approach from…
|
|
Tom Soderstorm: All our programs are using big data and the big thing for us -- I'm going to give a specific example, which is unusual. You wouldn't have thought of it. It's entering a…
|
|
Jeanne Holm: Sure. Again, GSA really provides the federation of data from across cities, counties, states and the federal government. I always like to think of the stories of what people are acutally…
|
|
|
|
Rick Holgate: You know and it’ll actually be hard just to pick one. Frankly, yeah, and I alluded to some of them earlier. I think, you know, veterans’ affairs is an example of aggressive…
|
|
Rod Turk: Oh absolutely. In fact, when I take a look at Department of Commerce, and I think the same is true with most other departments, basic cyber hygiene is really what we need to be looking…
|
|
William Lay: Yes, on the PC side we really took advantage of our Window7 migration over the last year to come up with a standard configuration that had all of the agents and the tools to inform our…
|
|
John Streufert: I appreciate Rod bringing that up. The Center for Strategic and International Studies has told us that 75% of the attacks used known vulnerabilities that could be patched and more…
|
|
Richard Marcell: So 2 years ago, army kicked off an initiative to begin to do user activity monitoring on one of the classified networks. And before we started this, we really had no insight on what…
|
|
Dawn Leaf: I would like to approach that really on 2 levels. We look at something as basic as email and that does not sound like a big deal, but when…
JIm Flyzik: No. It is a bigger deal…
|