What are the strategic priorities of Labor’s Office of Unemployment Insurance? How does the UI program work? What are improper payments and how has UI program sought to reduce them? Join us as we explore these questions with Gay Gilbert, Administrator, Office of Unemployment Insurance within the U.S. Department of Labor.
Important social challenges cross agency boundaries, and working effectively to solve these problems is not easy. Join us as we explore how New Zealand tackles these wicked challenges with Rodney Scott, co-author of the IBM Center report, Interagency Performance Targets: A Case Study of New Zealand’s Results Programme. How have Public Management Reforms evolved in New Zealand? What is the New Zealand Results Programme? What can other governments learn from the New Zealand experience?
Wally Coggins, the director of the IC Security Coordination Center in the Office of the Director of National Intelligence, has a full plate this year. He says that in the dynamic threat environment, he and his staff are working on three initiatives.
Jeff Wichman, the practice director for enterprise incident management at Optiv, says the government is doing a “bang up job if effectively responding to cybersecurity incidents.
With the increasingly frequent and diverse nature of cyber attacks, organizations including federal agencies have put a lot of effort into advanced detecting and deeper understanding these threats. “Now,” says Ian Doyle, executive security advisor at IBM Federal, “we’re really seeing the pendulum swing to more response actions.”
Without a serious effort at automation, the many segments of the cybersecurity response and kill-chain threaten to overwhelm security operations and information security staffs.
Lt. Gen. Bob Ferrell, the Army’s chief information officer/G6, said there are several parallel initiatives like data center consolidation and network consolidation to reach the end goal of having a modernized IT infrastructure and end-user services.
The General Services Administration awarded a $149 million contract to IBM to modernize its HR systems, instead of using a federal shared services provider.
The 2017 Federal Information Security Management Act (FISMA) guidance to agencies redefines what constitutes a major cyber incident for a third time in the last decade.
The next president, in order to hit the ground running during his or her first 100 days, will need a strategy for keeping the federal workforce's innovation projects from losing momentum.
The Office of Management and Budget updated Circular A-130 with the requirement for agencies to focus on risk management when deciding on how to protect networks and systems.
Sally Long with the Open Group Trusted Technology Forum, Cisco Systems' Edna Conway, and IBM's Andras Szakal join host Roger Waldron to discuss how the forum is addressing the challenges of supply chain risk managment in the federal government. July 19, 2016
The technological underpinnings of digital currency promises to transform information technology itself. The main piece is called Blockchain, and IBM has staked out territory by offering open source code for Blockchain. Jerry Cuomo, IBM fellow and vice president for Blockchain, shares the details on Federal Drive with Tom Temin.
Depending on whose numbers you believe, federal workers are either overpaid by 34 percent or underpaid by 25 percent compared to the private sector.
DoD approved IBM to be its second Level 5 security cloud provider just as FedRAMP is finalizing its high baseline standard.