The enterprise landscape of protecting the network is continuously changing and advisories are constantly evolving to meet the changing landscape. Hackers have become more sophisticated, both in their methods and in the data they target.
This content is provided by KPMG The supply chain is the backbone of operations for the military and defense agencies. From the initial request for required equipment, to transporting it anywhere in the world, and then…
More and more government organizations are considering moving larger and larger portions of their data to the cloud. This transformation eventually allow agencies to deliver services faster and more efficiently to customers and employees by a variety of methods.
While the goal of government organizations is to serve the public, the true challenge is to keep track of how the public is ultimately served.
Agencies are expecting to see improvements across the board when it comes to customer service over the next year. The reason for such optimism comes from a growing understanding of what it takes to provide exceptional customer service.
This program will provide a progress report on CDM in government.
This content is provided by KPMG Not too long ago the idea of using artificial intelligence (AI) would have been looked at as science fiction by nearly any government agency. In June of 2017 at KPMG’s…
In this interview with Federal News Network’s Tom Temin, KPMG's Kirke Everson describes the three levels of RPA maturity and how to achieve them, and he describes use cases for RPA deployed internally and for public services. Hear more on Artificial Intelligence/Machine Learning Month.
This program will provide a progress report on machine learning and AI in government.
Programs suffering from waste, fraud, abuse and increasing improper payments are low-hanging fruit when it comes to cutting federal spending, since they require little-to-no political will to address; government efficiency is a nonpartisan issue.
Participants in a recent Federal News Radio panel discussion explored how the threat environment is changing and how federal agencies are tying together data from what’s going on with strategies for stopping threats before they turn into damage or pilfered data.
In modernizing the IT systems that support these and a myriad of other processes, agencies are trying to introduce a new a new level of automation that incorporates data analysis, improved business processes, and greater cybersecurity and privacy controls.
Ever since Edward Snowden went against the National Security Agency, it seems like the federal government has been victim to a string of insider threats carried out. The latest being the young woman who sent NSA documents to a news site. David Buckley, managing director for federal risk consulting at KPMG, joined Federal Drive with Tom Temin to provide ideas for how agencies can mitigate the insider threat in the cyber age.
As the cybersecurity challenge has morphed into a multi-front battle – from the insider in the next cubicle to a distant but malevolent foreign power – chief information security officers, network operations and security operations center staffs have steadily acquired a variety of tools to counter the threats. Few federal agencies are operating with an abundance of resources, even for such a high priority activity as cybersecurity.