Jeff Fossum, senior vice president at Booz Allen Hamilton, said agencies need to take a holistic view of their digital transformation effort, or face new systems or processes that miss the mark.
It’s designed to develop and purchase large, expensive weapons systems while holding to the tenets of competition, transparency and integrity, but that means it can’t keep up with cybersecurity defense.
GAO found that most CFO Act agencies still have major weaknesses in information security areas like access control, and have not implemented hundreds of GAO and IG recommendations.
The Navy has to figure out how to harness, organize and deliver its data to users before it can start utilizing that data for decision making.
Federal information technology executives are tasked with managing the data inundation and cyber threats they encounter on a daily basis, often with limited resources, both from a budgetary and skilled personnel perspective. Federal News Radio recently spoke with Steve Hull, chief information officer at Leidos, to address these issues and more.
Cybersecurity competitions are drawing more attention from and becoming more popular with federal agencies.
Educational opportunity is the most important motivation government can use to attract cybersecurity talent, even more than pay or mission.
Federal efforts to develop a well-trained cybersecurity workforce are ramping up, due in large part to the edicts of President Donald Trump’s cybersecurity executive order.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
Defense information pro Paul DeMennato offers advice about protecting informational systems against insider threats. He said it’s more than keeping up to date on patches and monitoring files for human anomalies, it’s about getting your staff to buy in to a culture of protecting against insider attacks.
Wayne Belk, co-director of the National Insider Threat Task Force, wants feds to know that insider threat programs are there to protect them, not to get them in trouble.
IBM has claimed 60 percent of all intrusions can be attributed to insider threat. Further, Information Week suggests that 95 percent of all organizations have employees who seek to bypass security controls.
The OCC uses bank statement data, loan level data, financial market data, economic and legal data to provide the government with both holistic, macroeconomic views and the ability to dive deep into a particular subject.
When you try to make sense of the petabytes of data flowing across your desk you really don’t know what has value. There aren’t enough hours in the day to carefully parse each data set you have responsibility for. The most practical approach is to add some kind of a tool to automate the process.