New data, technology create an avenue for public and agencies to grow closer together
This program will provide a progress report on devops in government.
The federal government’s opportunity to change the way healthcare is delivered and consumed is immense.
This program will provide a progress report on cybersecurity strategies in government.
Predicting the future is never easy, but it’s safe to say that work is becoming more mobile. At least, organizations including federal agencies are giving employees more leeway to work in an on-the-go way. And they’re deploying a growing number of enterprise applications onto mobile devices – smartphones and tablets.
For its federal IT strategy, the Trump administration is continuing the emphasis for the use of cloud computing as established during the previous administration. But cloud is a moving target for federal agencies.
Moving any enterprise to the cloud presents new challenges, particularly as data is moved off-premises. Over the last seven-plus years, agencies have faced many of those challenges as they decided what type of services in the cloud to implement.
The latest data on the Federal IT Dashboard shows agencies are spending almost 71 percent of their technology budgets on operations and maintenance and less than 21 percent on development, modernization and enhancements for systems.
This program will provide a progress report on secure mobility solutions in government.
Before the Obama administration left office in December, it left a series of reports for the incoming Trump administration.
Without a serious effort at automation, the many segments of the cybersecurity response and kill-chain threaten to overwhelm security operations and information security staffs.
This program will provide a progress report on emergency communications and preparedness..
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
There’s an acronym used by federal leaders in the business of preventing or responding to Chemical, Biological, Radiological, Nuclear and Explosive attacks: VUCA. It stands for “volatile, uncertain, complex and ambiguous,” it describes the CBRNE operational environment, and they agree that it’s only getting more apt.