Recently, John Chambers was in town for meetings of the U.S.-India Business Council, which he chairs. His visit coincided with Prime Minister Narendra Modi’s White House meetings with President Trump. Chambers is now chairman of the board at Cisco Systems after having served as CEO for more than 20 years–an eternity in Silicon Valley. He spoke at a CXO breakfast attended by 20-plus government CXOs. Here are some highlights of his remarks.
- Countries that have embraced digital transformation have seen growth in their Gross Domestic Product (GDP), increased the number of startups (which in turn leads to job creation), and improved education and health care.
- One can look to countries like India, Israel, and France, which have all launched digital transformation initiatives. France? A country better known for a 35-hour workweek and rigid labor laws? Yes. Visit a vast project in the heart of Paris, a refurbished train depot called Station F (ironic here with our 18F innovation office at General Services Administration headquarters). It already houses 1,000 startups and aims to amass the largest group of entrepreneurs, venture capital firms, incubators and accelerators anywhere in the world.
- France has already become one of Europe’s top destinations for startup investment. Venture capital and funding deals last year surpassed that activity in Germany, making it second only to Great Britain in Europe.
- The United States risks falling behind because it lacks a national digital strategy. What should be the elements of such a strategy? Here are four–as described in a recent speech by the new President (and former Minister of Economy, Industry and Digital Affairs) of France, Emmanuel Macron: (1) Invest–create investment vehicles to make grants and loans available to fund startup and accelerators at easy terms; (2) Promote Tech–Use smart and connected cities as tech hubs; (3) Offer Incentives–lure international tech talent by providing a fast-track work visa for entrepreneurs and their families; and (4) Ease Tax Laws–create a special tax status for innovative new companies.
- The goal of any such strategy should be to disrupt. Focus on the technology and market transitions happening now. Focus on customers and citizens. Implement quicker. Embed security. Break down silos. One CXO interjected that in government we call them “cylinders of excellence.” Put an architecture in place and assemble “innovation playbooks” so you can replicate your success elsewhere. Finally, focus on outcomes (e.g., growing the economy, creating jobs, stirring new business startups, etc.).
- What are the top challenges to creating a digital government here in the U.S.? They are culture, silos, security, lack of resources, overconfidence/arrogance. Our country risks being left behind (e.g., the number of IPOs on the New York Stock Exchange is declining).
- The CXOs in attendance confirmed that agencies are moving in different directions, thereby adversely affecting the government’s ability to deliver integrated services to citizens. Chambers noted the need for leadership from the top and argued against “doing the right thing for too long.”
- Cyber crime has passed physical crime in terms of its economic toll. Why? The famous criminal Willie Sutton was once asked why he robbed banks, and his response was simple, eloquent, and humorous: “Because that’s where the money is.” Today not only do you need to secure your network but you also need to secure the devices that people use in their everyday life and expect to also be able to use in their work life.
- In closing, Chambers urged the group of technologists that represented agencies and departments across the government to educate their leadership on the importance of digital transformation, to create organizations that can deliver technology, systems, and results with the speed needed to respond to today’s changing landscape, and to work across the government to break down stovepipes to deliver better services to the public.
What were some of the takeaways for these government CXOs? One of the authors of this article queried a number of them a day or so after the breakfast. Their responses are instructive.
- I’m going back to meet with my boss and talk about how we can enhance our interactions with our customers. How can we make the interactions more useful, more usable, more efficient and so on?
- What can we do to shift from legacy back-office systems that are consuming too many of our resources to digital platforms? How can we reallocate $$$ to more direct citizen engagement?
- I’m going to meet with my own staff to ensure we have the proper technology platforms in place to support a digital transformation–an up-to-date infrastructure, analytics, privacy, security, mobility, and user experience–to mention just a few examples.
- Who else needs to be involved–top leadership (obviously). But who else? Management and Budget and the CFO. Human Resources. Legal. Who else?

Alan Balutis is a Distinguished Fellow and Senior Director, U.S. Public Sector for Cisco Systems. He has been in the public service and industry business for over 30 years. He was a founding member of the Federal CIO Council. His 28 years in the Federal sector were spent at the Department of Commerce, where he headed its management and budget office as its first CIO.

Martha Dorris is a founder at Dorris Consulting International. She spent more than 30 years at GSA and was president of the American Council for Technology. She was senior adviser to the board for the International Council for IT in Government Administration (ICA).

Will Ash leads Cisco’s Security sales team serving U.S. Public Sector customers. This team is focused on delivering protection to government and education customers across their extended network before, during, and after a cyberattack through threat-centric security solutions. He previously led Cisco’s Atlantic Enterprise team.




 Nowhere is this example more apparent than at NASA. Take, for example, NASA’s Voyager 2 program. NASA scientists and engineers have been working on Voyager 2 for 40 years. It’s the only spacecraft to have ever visited Uranus and Neptune, and is currently making its way to interstellar space. The technical achievements recorded during missions to photograph Uranus, Neptune, and Neptune’s moons are without parallel and were done by career NASA employees.
Nowhere is this example more apparent than at NASA. Take, for example, NASA’s Voyager 2 program. NASA scientists and engineers have been working on Voyager 2 for 40 years. It’s the only spacecraft to have ever visited Uranus and Neptune, and is currently making its way to interstellar space. The technical achievements recorded during missions to photograph Uranus, Neptune, and Neptune’s moons are without parallel and were done by career NASA employees.
 MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from
MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from  As the State Department works to gain international support for its cybersecurity framework, experts said that global norms and deterrence won’t be enough to convince state actors not to influence elections through cyber means
As the State Department works to gain international support for its cybersecurity framework, experts said that global norms and deterrence won’t be enough to convince state actors not to influence elections through cyber means  The Office of Management and Budget unveiled its plan to reorganize Federal agencies, called the “Comprehensive Plan for Reforming the Federal Government and Reducing the Federal Civilian Workforce,” which responds to President Trump’s March 13 executive order to OMB. The plan requires agencies to take immediate action on reducing their workforce and saving money, and submit a long term plan for maximizing worker performance by the end of June. Agencies will also be required to submit an Agency Reform Plan within 180 days to modernize
The Office of Management and Budget unveiled its plan to reorganize Federal agencies, called the “Comprehensive Plan for Reforming the Federal Government and Reducing the Federal Civilian Workforce,” which responds to President Trump’s March 13 executive order to OMB. The plan requires agencies to take immediate action on reducing their workforce and saving money, and submit a long term plan for maximizing worker performance by the end of June. Agencies will also be required to submit an Agency Reform Plan within 180 days to modernize  John Short, the program executive for the VistA Evolution program at the Department of Veterans Affairs, has been tapped to take over as the acting deputy director of the DOD/VA Interagency Program Office responsible for ensuring electronic health record sharing between the VA
John Short, the program executive for the VistA Evolution program at the Department of Veterans Affairs, has been tapped to take over as the acting deputy director of the DOD/VA Interagency Program Office responsible for ensuring electronic health record sharing between the VA  The National Geospatial-Intelligence Agency needs to attract new tech talent with new ideas and a desire to work on something bigger and more important than the next popular dating app. One of the ways the agency hopes to do that is by continuing to work with the government’s own in-house
The National Geospatial-Intelligence Agency needs to attract new tech talent with new ideas and a desire to work on something bigger and more important than the next popular dating app. One of the ways the agency hopes to do that is by continuing to work with the government’s own in-house  The government needs to create and fund new hiring programs to fill Federal cyber vacancies, according to experts testifying before the House IT Subcommittee on Tuesday. During the hearing, IT subcommittee chairman Will Hurd, R-Texas, floated the idea of creating a Cyber National Guard that would pull workers from the private sector for short stints of work
The government needs to create and fund new hiring programs to fill Federal cyber vacancies, according to experts testifying before the House IT Subcommittee on Tuesday. During the hearing, IT subcommittee chairman Will Hurd, R-Texas, floated the idea of creating a Cyber National Guard that would pull workers from the private sector for short stints of work  President Donald Trump ran his campaign on the promise of a wall that would run the length of the U.S.-Mexico border. While Secretary of Homeland Security John Kelly still does not know what the wall will look like, he said it will probably not resemble the single concrete partition
President Donald Trump ran his campaign on the promise of a wall that would run the length of the U.S.-Mexico border. While Secretary of Homeland Security John Kelly still does not know what the wall will look like, he said it will probably not resemble the single concrete partition 
 Agencies at the state and local level need to adopt cybersecurity practices that cater to their individual needs, according to many of the experts who testified at a Senate hearing. Patricia Hoffman, acting assistant secretary of DOE’s Office of Electricity Delivery and Energy Reliability, stated that the agency does not have a single model for cybersecurity regulations, but rather recommends certain components that could contribute to a
Agencies at the state and local level need to adopt cybersecurity practices that cater to their individual needs, according to many of the experts who testified at a Senate hearing. Patricia Hoffman, acting assistant secretary of DOE’s Office of Electricity Delivery and Energy Reliability, stated that the agency does not have a single model for cybersecurity regulations, but rather recommends certain components that could contribute to a  More than two years after Congress passed the Federal Information Technology Acquisition Reform Act—the biggest overhaul of Federal IT acquisition in decades—most Federal chief information officers say they still don’t have the authority necessary to manage technology
More than two years after Congress passed the Federal Information Technology Acquisition Reform Act—the biggest overhaul of Federal IT acquisition in decades—most Federal chief information officers say they still don’t have the authority necessary to manage technology  The IT team at the Federal Communications Commission has been working to re-prioritize its projects to align with the goals of the agency’s new leadership, which has forced officials to make tough decisions about modernization. David Bray, the chief information officer at the FCC, and his team presented the projects that they are working on to Chairman Ajit Pai earlier this month to get his opinion on where the team should focus its efforts. Pai wants the IT team to focus on the development and back-end technology for the FCC’s actions including Mobility Fund Phase II and Connect America Fund Phase II, which serve to bring broadband
The IT team at the Federal Communications Commission has been working to re-prioritize its projects to align with the goals of the agency’s new leadership, which has forced officials to make tough decisions about modernization. David Bray, the chief information officer at the FCC, and his team presented the projects that they are working on to Chairman Ajit Pai earlier this month to get his opinion on where the team should focus its efforts. Pai wants the IT team to focus on the development and back-end technology for the FCC’s actions including Mobility Fund Phase II and Connect America Fund Phase II, which serve to bring broadband  After the huge success of the Hack the Pentagon bug bounty program, members of the Department of Defense and participating organizations are calling on other government agencies to copy the DoD program
After the huge success of the Hack the Pentagon bug bounty program, members of the Department of Defense and participating organizations are calling on other government agencies to copy the DoD program  The Department of Transportation is holding off on creating new rules for automated vehicles and unmanned aerial systems because of President Donald Trump’s limit on new regulations, according to DOT officials. DOT has worked on a proposed rulemaking that would require cars to include vehicle to vehicle (V2V) communications, which would allow cars to talk to one another
The Department of Transportation is holding off on creating new rules for automated vehicles and unmanned aerial systems because of President Donald Trump’s limit on new regulations, according to DOT officials. DOT has worked on a proposed rulemaking that would require cars to include vehicle to vehicle (V2V) communications, which would allow cars to talk to one another 
 The deadline for Federal agencies to close all of their data centers by 2018 will probably be extended for an unspecified amount of time, according to Dave Powner, director of IT issues at the Government Accountability Office. The Federal Information Technology Acquisition Reform Act requires agencies to close their data centers by 2018. The most recent FITARA scorecard, released Dec. 6, indicates that the consolidation process is moving slowly. Twelve of the 24 graded agencies received a C or worse in the
The deadline for Federal agencies to close all of their data centers by 2018 will probably be extended for an unspecified amount of time, according to Dave Powner, director of IT issues at the Government Accountability Office. The Federal Information Technology Acquisition Reform Act requires agencies to close their data centers by 2018. The most recent FITARA scorecard, released Dec. 6, indicates that the consolidation process is moving slowly. Twelve of the 24 graded agencies received a C or worse in the  Big Blue is on a roll. The company on Monday announced a new data center in China, upping its cloud footprint to 51 data centers in 20 countries and signaling a continued enterprisewide push to make cloud computing a central component of its
Big Blue is on a roll. The company on Monday announced a new data center in China, upping its cloud footprint to 51 data centers in 20 countries and signaling a continued enterprisewide push to make cloud computing a central component of its  The FBI has been using facial recognition technology since 2010. Its Next Generation Identification-Interstate Photo System contains millions of photos of Americans, which FBI officers use during criminal investigations. The Government Accountability Office found that the database, which cost $1.2 billion to create, correctly returns matches 86 percent of the time. The National Institute of Standards and Technology requires facial recognition returns to be correct 85 percent
The FBI has been using facial recognition technology since 2010. Its Next Generation Identification-Interstate Photo System contains millions of photos of Americans, which FBI officers use during criminal investigations. The Government Accountability Office found that the database, which cost $1.2 billion to create, correctly returns matches 86 percent of the time. The National Institute of Standards and Technology requires facial recognition returns to be correct 85 percent  Federal agencies are hemorrhaging billions of dollars every year due to fraud, waste, and improper payments, according to the Government Accountability Office. And the problem may be getting worse, with the governmentwide improper payment rate reaching $144 billion in fiscal year 2016. To put those percentages in perspective, GAO found that $44 billion of Federal improper payments in FY 2016 were caused by insufficient documentation. Another $34 billion were the result of the inability to authenticate eligibility, meaning an improper payment was made because agencies lacked databases or other resources to help determine
Federal agencies are hemorrhaging billions of dollars every year due to fraud, waste, and improper payments, according to the Government Accountability Office. And the problem may be getting worse, with the governmentwide improper payment rate reaching $144 billion in fiscal year 2016. To put those percentages in perspective, GAO found that $44 billion of Federal improper payments in FY 2016 were caused by insufficient documentation. Another $34 billion were the result of the inability to authenticate eligibility, meaning an improper payment was made because agencies lacked databases or other resources to help determine 
 The proposed budget cuts civilian agency spending by 5 percent and would lead to a drastic reduction in the size of the Federal workforce. But a more telling aspect of the budget blueprint is its focus on accountability and performance. Federal IT programs (and all other programs, for that matter) will need to demonstrate measurable return on their investments if they want the Trump administration to
The proposed budget cuts civilian agency spending by 5 percent and would lead to a drastic reduction in the size of the Federal workforce. But a more telling aspect of the budget blueprint is its focus on accountability and performance. Federal IT programs (and all other programs, for that matter) will need to demonstrate measurable return on their investments if they want the Trump administration to  The Department of Justice released an indictment of four men involved in the 2016 hack of Yahoo email accounts, two of whom were acting in their capacity as Russian intelligence and security officers. “The defendants include two officers of the Russian Federal Security Service, an intelligence and law enforcement agency of the Russian Federation, and two criminal hackers with whom they conspired to accomplish these intrusions,” said U.S. acting assistant attorney
The Department of Justice released an indictment of four men involved in the 2016 hack of Yahoo email accounts, two of whom were acting in their capacity as Russian intelligence and security officers. “The defendants include two officers of the Russian Federal Security Service, an intelligence and law enforcement agency of the Russian Federation, and two criminal hackers with whom they conspired to accomplish these intrusions,” said U.S. acting assistant attorney  President Donald Trump picked a National Security Agency official to lead White House cybersecurity policy issues during a time when NSA surveillance powers are up for discussion and bad blood exists between the NSA and industry. Rob Joyce began serving as the chief of the National Security Agency’s Tailored Access Operations organization in April 2013 and will work for the Trump administration on managing cybersecurity efforts, according
President Donald Trump picked a National Security Agency official to lead White House cybersecurity policy issues during a time when NSA surveillance powers are up for discussion and bad blood exists between the NSA and industry. Rob Joyce began serving as the chief of the National Security Agency’s Tailored Access Operations organization in April 2013 and will work for the Trump administration on managing cybersecurity efforts, according  The Federal Aviation Administration has not established any rules for commercial companies that collect and retain personal information, according to Earl Lawrence, director of the FAA’s Office of Unmanned Aircraft Systems. Several commercial companies have added unmanned aircraft systems, or drones, to their delivery fleets. These devices, furnished with cameras, have the ability to photograph people and their possessions. For example, a drone could photograph the license plates of cars at a health clinic and sell the information
The Federal Aviation Administration has not established any rules for commercial companies that collect and retain personal information, according to Earl Lawrence, director of the FAA’s Office of Unmanned Aircraft Systems. Several commercial companies have added unmanned aircraft systems, or drones, to their delivery fleets. These devices, furnished with cameras, have the ability to photograph people and their possessions. For example, a drone could photograph the license plates of cars at a health clinic and sell the information 
 A cybersecurity firm found critical vulnerabilities in a messaging application used by White House staffers, which could have allowed malicious hackers access to their conversations. IOActive began conducting its investigation into Confide’s vulnerabilities in February and found that hackers could impersonate another user by hijacking an account session or guessing passwords, learn the contact information of all or specific Confide users, become an intermediary in a conversation and decrypt messages, and alter the contents of
A cybersecurity firm found critical vulnerabilities in a messaging application used by White House staffers, which could have allowed malicious hackers access to their conversations. IOActive began conducting its investigation into Confide’s vulnerabilities in February and found that hackers could impersonate another user by hijacking an account session or guessing passwords, learn the contact information of all or specific Confide users, become an intermediary in a conversation and decrypt messages, and alter the contents of  Ninety-two percent of the most popular Federal websites fail to meet standards in either security, speed, mobile friendliness, or accessibility, according to a study released Wednesday by the
Ninety-two percent of the most popular Federal websites fail to meet standards in either security, speed, mobile friendliness, or accessibility, according to a study released Wednesday by the  According to the leaked documents, the CIA has the ability to hack iPhones, Android devices, smart vehicles, and Samsung smart televisions. The agency’s method of hacking smart TVs was developed in tandem with the United Kingdom’s MI5. Labeled “Weeping Angel,” this type of hack can turn on a smart television’s audio system and record someone’s conversation while he or she thinks the machine is off. “Weeping Angel” also suppresses the device’s LED lights to improve the look of the
According to the leaked documents, the CIA has the ability to hack iPhones, Android devices, smart vehicles, and Samsung smart televisions. The agency’s method of hacking smart TVs was developed in tandem with the United Kingdom’s MI5. Labeled “Weeping Angel,” this type of hack can turn on a smart television’s audio system and record someone’s conversation while he or she thinks the machine is off. “Weeping Angel” also suppresses the device’s LED lights to improve the look of the  Major innovations in blockchain for health data are likely to happen this year with the help of Federal agencies, industry experts say, even though applications for the technology have yet to reach mass markets. A blockchain is a data structure that can be time-stamped and signed using a private key to prevent tampering. It was most popularly used to create the digital currency Bitcoin but is increasingly expanding
Major innovations in blockchain for health data are likely to happen this year with the help of Federal agencies, industry experts say, even though applications for the technology have yet to reach mass markets. A blockchain is a data structure that can be time-stamped and signed using a private key to prevent tampering. It was most popularly used to create the digital currency Bitcoin but is increasingly expanding