MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT. […]

The House and Senate Intelligence Committees each passed restrictions on the Privacy and Civil Liberties Oversight Board that would restrict its funding, give it jurisdiction only over the privacy of people in the United States, and force it to report to the agencies that it’s overseeing.






[…]

The Cyber Security National Action Plan announced in February is aiming to recruit people with broad skill sets to work in Federal government cybersecurity. U.S. Chief Information Officer Tony Scott spoke Thursday at the Federal Forum in Washington, D.C., about recruiting people with knowledge on specific domains, economics, and human behavior. “Our approach needed strengthening,” Scott said.






[…]

MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.






[…]

The Federal Communications Commission’s new consumer privacy rules cause disagreements among experts about whether the rules are overbearing or progressive.






[…]

The Department of Health and Human Services welcomed Beth Anne Killoran as its new chief information officer.






[…]

The U.S. Department of Agriculture received a C grade on its Federal Information Technology Acquisition Reform Act scorecard, which was released in May. Flip Anderson, acting executive director of FITARA for USDA, was so frustrated with the FITARA grading system that he created his own scorecard to gauge how closely the USDA complies with the act’s mandates.






[…]

MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT






[…]

The American Civil Liberties Union filed a lawsuit against the U.S. Attorney General on June 29, arguing that a section of the Computer Fraud and Abuse Act unconstitutionally criminalizes research aimed at determining whether online algorithms result in discrimination against certain races, genders, and other minority groups.






[…]

MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.






[…]

Ransomware is the least of a CIO’s worries, according to new report issued by the Institute for Critical Infrastructure Technology (ICIT). James Scott, ICIT senior fellow and Drew Spaniel, ICIT researcher, co-authors of a new report, titled “The Anatomy of Cyber-Jihad: Cyberspace is the New Great Equalizer,” call cyber jihadists the latest threat to America […] […]

Government IT has a problem with planning better solutions, not coming up with ideas for those solutions, according to Federal CIO Tony Scott. “Ideas are not the problem in Washington; Washington is full of ideas. What Washington doesn’t have…is a good implementation plan for those ideas,” Scott said at a Citrix cybersecurity event.






[…]

Federal agencies can now use cloud computing systems to store their most sensitive, unclassified data, through the recent release of the Federal Risk and Authorization Management Program High Baseline.
“This release allows agencies to use cloud environments for high-impact data, including data that involves the protection of life and financial ruin,” said the FedRAMP announcement.






[…]

MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.






[…]

In his keynote speech at the 2016 Cloud Computing Brainstorm, U.S. Chief Information Officer Tony Scott recalls his time working with the legendary Steve Jobs during Disney’s acquisition of Pixar Animation Studios, outlines his plan for modernizing the government’s aging IT infrastructure, and offers the possibility of staying in the CIO role longer.






[…]

In a review of its progress over the past nine months compared with the four years before that, the GSA released an infographic touting the increases in authorizations, re-uses, and use frequency of cloud service providers.






[…]

MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.






[…]

1 27 28 29 30 31 34

Categories