New CISO’s Strategy Aims to Boost Cyber Security at Every Level of Government New CISO’s Strategy Aims to Boost Cyber Security at Every Level of Government
New CISO’s Strategy Aims to Boost Cyber Security at Every Level of Government
GEMG 250×250
ATARC FISS 250×250
gdit cloud 250×250
WAMU Spark 250×250
BDX:Big Data Brainstorm 250×250

Sign Up For Our Newsletter

Fields marked with an * are required

Stay informed!
Get GovTechWorks delivered to your inbox

GM 250×250

Latest Articles

Can DoD Develop Effective Cyber Deterrents?

Can DoD Develop Effective Cyber Deterrents?

While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.
How a Board Game Helps DoD Win Real Battles

How a Board Game Helps DoD Win Real Battles

Digital gaming technology keeps troops up at night playing personal shooter games and other war simulations. But joint commanders continue to use an Army-built board game to test their battle plans.

Upcoming Events

State & Local

Hacking the Election and Other Worries that Keep Intel Chiefs Up at Night

Cyber worries ranging from the integrity of the election system to the end-to-end encryption of digital devices top the concerns of America’s intelligence chiefs.

Read More

What's New

Exit Plans Should be Part of Cloud SLAs

Most cloud service level agreements are vague when it comes to details about termination. But extracting your data from a cloud provider is of critical concern to agencies. Standards could help, but won’t prescribe the answer, says an expert from the National Institute of Standards and Technology.
GEMG Tower

Talking Tech Videos

What We’re Reading

Time to Evolve FITARA Oversight?

A little over a year ago, the House Oversight and Government Reform Committee released its first set of grades for how agencies were implementing the Federal IT Acquisition Reform Act (FITARA). The grades, as expected, weren’t good. By May, when the committee released its second report card, some agency scores had improved, but many agency chief information officers started to see the shortcomings in how lawmakers were holding them accountable.

Electronic Threats from Above

Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).

FedRAMP Overhaul Begins Paying Dividends

The Federal Risk Authorization and Management Program’s (FedRAMP) new streamlined, simplified process is paying off. The program is boasting increased authorizations and return business, and the new dashboard is making it easier for feds to use the program.

One of Air Force’s Most Important Unclassified Systems is Now in the Oracle Cloud

One of the U.S. Air Force’s most important online portals is now running in the cloud. MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.

DHS Nurtures Wearable Tech for Responders

Ten startups will be working on EMERGE 2016, the Department of Homeland Security Science and Technology Directorate’s program supporting research and development of wearable technology for first responders. EMERGE 2016 expands on last year’s pilot that accelerated the delivery of the latest innovative wearable technologies for first responders by bringing startups, accelerators and strategic partners together in a common research and development effort.