Submitted by TFryer on Tue, 01/23/2018 - 13:34
Dan Chenok Interesting and informative infographic on national cybersecurity preparedness. Interesting notes on identity management and recent financial executive order. Interesting observations on open source and security. John Kamensky Countering ID Theft. Jason Miller, Federal News Radio, reports that the White House is giving agencies a lead role in combatting ID theft, noting: “President Barack Obama signed an Executive Order on Oct.
Submitted by TFryer on Tue, 01/23/2018 - 13:03
Dr. Boston, visiting the U.S. on a Fulbright Scholarship, sums up some of his initial research on how the U.S. and several other democratic countries address long-term policy issues, in a recent presentation at American University.
Submitted by TFryer on Tue, 01/23/2018 - 12:58
The (SEC) protects investors, maintains fair and orderly markets, and facilitates capital formation. It is organized into five divisions, one of which is the Enforcement Division, where Ms. Walsh’s Center is housed. Ms. Walsh says , “the Enforcement Division’s mission is to pursue violations of securities laws and to try to get meaningful remedies, with significant deterrent value. So identify, pursue, and prevent violations of the securities laws.” The SEC has several analytics programs that are structured in a “hub and spoke system.” Ms.
Submitted by TFryer on Mon, 01/22/2018 - 21:34
My goal in blogging has been to provide context, insight, and inspiration on government management challenges for public sector managers, especially at the U.S. federal level. Following are blog posts from the past year organized around several themes, largely reflecting the trends reflected in the IBM Center’s research agenda. Hope you find this useful!
Submitted by TFryer on Mon, 01/22/2018 - 21:18
The Center for The Business of Government continues to support reports by leading thinkers on key issues affecting government today. We are pleased to announce our latest round of awards for new reports on key public sector challenges, which respond to priorities identified in the Center's long-term research agenda, see businessofgovernment.org/content/research-stipends. We expect the following reports to be published later in 2015. Short summaries of each report are included below.
Submitted by TFryer on Mon, 01/22/2018 - 21:10
In particular, the Department must focus on mitigating high-risk issues and inefficiencies, including data security and accessibility, base realignment, and cost of employee benefits. The Department has already made progress in employing a change management approach, but further effort is needed. In light of these challenges, the Department can seize the current opportunity to maximize its resources and cultivate more strategic enterprise-level leadership.
Submitted by TFryer on Mon, 01/22/2018 - 21:03
The Department of Educaton (ED) maintains many risk management tools, two of which are new: the State Score Cards and the Entity Risk Review. This report explains how these two tools are being used and provides examples of how risk management tools have been used to track the progress of two high risk grantees: Detroit Public Schools and Puerto Rico. Based on their examination of the ED experience, the authors present a series of lessons learned and recommendations for other agencies.
Submitted by TFryer on Mon, 01/22/2018 - 11:47
OMB conducted a broad set of internal and external outreach meetings to draft the guidance, and is now taking comments on that draft. OMB strongly encourages substantive comments to be sent today to allow for careful consideration of early feedback. This process could be a model for OMB guidance in other areas. Congress passed the FITARA statute in December 2014, as Sections 831-837 of the National Defense Authorization Act.
Submitted by TFryer on Thu, 01/18/2018 - 14:42
co-authored by guest blogger Andras Szakal, Vice President and CTO, US Federal, IBM Benefits from FedRAMP FedRAMP has made great strides in operationalizing the federal security C&A process. FedRAMP brings commercial best practices standardization of the process for cloud security, and does across agencies in a way that also provides consistency across the entire federal government.
Submitted by evalery on Tue, 01/02/2018 - 11:59
A new report by the IBM Center for the Business of Government helps government employees understand and mitigate the risks posed by use of social media.
Most government employees and agencies protect their computers by installing and updating reliable anti-virus software. Managers, IT staff and front-line workers understand the threats posed by malicious software, and they know that they have to take steps to counter that threat.
Pages