The DoD has decided that it must be better prepared to use space-based resources for global communications in a time of conflict. At the forefront of current efforts to secure the U.S. advantage in space building resiliency and redundancy into satellites and reducing dependency on GPS. What does the U.S. presence in space look like in twenty years?
- With support from the Daniel Rose Center for Public Leadership, city leaders are identifying opportunities to rethink land use in ways that both support existing communities and transform the city for the better. Route Fifty will sit down with mayors from across the country who are working with the Rose Center to tackle issues of revitalization, equity, and resiliency. We will discuss the challenges they face as their cities evolve and the strategies behind inclusive and comprehensive development. Register
Government Executive Media Group is proud to provide its readers with a lively, engaging calendar of events. Register to question, engage and interact with high-level federal employees, and hear about best practices and innovative thinking on the topics that matter most to you.Atlantic Media Event Guidelines
- Any organization, including the United States government, is only as strong as its weakest link. As the amount of data we collect, analyze, and store proliferates, the risk of cyber attacks significantly increases. In a time when state and local technology systems are interconnected and share sensitive data with each other and federal databases, cybersecurity along with entire information chain is essential. Join Route Fifty and Nextgov as we down with state and federal officials to discuss the cross-government cybersecurity resources available to technology managers at all levels of government and how each individual, department, and organization can effectively strengthen their cyber defense.
- While the Internet of Things (IoT) promises greater efficiency, the proliferation of so many connected devices widens the threat vector for those seeking to steal, alter, or cause harm to the IoT ecosystem. As IoT moves full speed ahead with its rapid growth and complexity, agencies face significant pressure to enhance data at the edge without compromising mission performance. Devices operating at their network’s “edge” demand particular attention, as their mobility and independence from core infrastructures challenge traditional security measures. Acknowledging the IoT is critical to executing your agency’s mission, are you confident that these devices are secure?
- The Department of Defense uses 8-inch floppy disk drives to manage nuclear forces. The Treasury Department has 56-year-old computer code to update taxpayer accounts. And the Department of Homeland Security and Department of Veterans Affairs rely on COBOL for a number of their agency functions. To address these aging systems, in October 2016 the Office of Management and Budget proposed a series of guidelines to help agencies assess their IT modernization needs. But as federal workers determine how to refresh their technology during 2017, they’ll need to parse through the good and the bad that comes with old legacy systems and determine what comes next.