SlideShare ist ein Scribd-Unternehmen logo
1 von 35
EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”
FEDERAL IT INITIATIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
John James ,[object Object],[object Object],FEDERAL IT INITIATIVES
Tony McMahon ,[object Object],[object Object],FEDERAL IT INITIATIVES
Federal IT Initiatives: What's Next? Are you ready?  Tony McMahon 7/19/2010 BDPA 2010 National Conference Executive Panel Discussions
The IRS Importance -  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wave - 2 12-36 Months Wave 3 - 24-54 Months ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Sources Sources: IRS Statistics of Income:  http:// www.irs.gov/taxstats/index.html   Congressional Budget Office  http:// www.cbo.gov /   Office of Management & Budget  http:// www.whitehouse.gov/omb / HIRE ACT:  http://www.irs.gov/newsroom/article/0,,id=220326,00.html
Robert “Bob” Whitkop ,[object Object],[object Object],[object Object],FEDERAL IT INITIATIVES
BDPA Symposium, Philadelphia Network Centricity 2020 Bob Whitkop Exec Director, NGEN SPO (202)213-7858 Technology in Motion: The changing shapes of the Cloud
We have the Network! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
It’s the Data ‘Stupid’… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does the Data get there? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure at the Door ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Greening IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing as an Enterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Team Vision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bob Whitkop [email_address] (202)213-7858
Enterprise ITSM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Centers morph into  the Network! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web 2.0: Window to Virtual Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dr Anthony Junior ,[object Object],FEDERAL IT INITIATIVES
Office of Naval Research (ONR) Funding Opportunity Announcement # 10-023 Deadline September 30, 2011
ONR Mission and Goals of STEM: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
We are looking to support Education, Activity, and Outreach Programs that: ,[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
We are looking to : ,[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Sample Education and Outreach Programs: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Application Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Application Process ,[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Points of Contact: ,[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
FEDERAL IT INITIATIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”

Weitere ähnliche Inhalte

Was ist angesagt?

Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeIan Lee
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 

Was ist angesagt? (18)

Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 

Andere mochten auch

Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)BDPA Education and Technology Foundation
 
Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Gabriel Rissi
 
Apostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteApostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteMayara Magna
 
Buscador OCW
Buscador OCWBuscador OCW
Buscador OCWbcriofrio
 
Matematik ders-anlatimi
Matematik ders-anlatimiMatematik ders-anlatimi
Matematik ders-anlatimizeynep_zyn36
 
Relacionamento
RelacionamentoRelacionamento
Relacionamentoemoc5
 
Mont taber
Mont taberMont taber
Mont taberCollaso
 

Andere mochten auch (20)

BDPA Chapter Building Workshop - Week #3
BDPA Chapter Building Workshop - Week #3BDPA Chapter Building Workshop - Week #3
BDPA Chapter Building Workshop - Week #3
 
2014 BDPA High School Computer Competition Meeting (Part 1)
2014 BDPA High School Computer Competition Meeting (Part 1)2014 BDPA High School Computer Competition Meeting (Part 1)
2014 BDPA High School Computer Competition Meeting (Part 1)
 
BDPA Chapter Management Guide
BDPA Chapter Management GuideBDPA Chapter Management Guide
BDPA Chapter Management Guide
 
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
 
Newsletter: BDPA Los Angeles (Mar 2002)
Newsletter: BDPA Los Angeles (Mar 2002)Newsletter: BDPA Los Angeles (Mar 2002)
Newsletter: BDPA Los Angeles (Mar 2002)
 
BDPA Chapter Building Workshop - Week #1
BDPA Chapter Building Workshop - Week #1BDPA Chapter Building Workshop - Week #1
BDPA Chapter Building Workshop - Week #1
 
Networking to Increase Your Net Worth
Networking to Increase Your Net WorthNetworking to Increase Your Net Worth
Networking to Increase Your Net Worth
 
SOP: SITES Funding Requests (Rev: Dec 2016)
SOP: SITES Funding Requests (Rev: Dec 2016)SOP: SITES Funding Requests (Rev: Dec 2016)
SOP: SITES Funding Requests (Rev: Dec 2016)
 
Newsletter: BDPA Cincinnati (Aug 2010)
Newsletter: BDPA Cincinnati (Aug 2010)Newsletter: BDPA Cincinnati (Aug 2010)
Newsletter: BDPA Cincinnati (Aug 2010)
 
BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)
 
IT and the Utilities Industry (Philadelphia, Jan 2013)
IT and the Utilities Industry (Philadelphia, Jan 2013)IT and the Utilities Industry (Philadelphia, Jan 2013)
IT and the Utilities Industry (Philadelphia, Jan 2013)
 
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
 
Newsletter: BDPA New York (Dec 2010)
Newsletter: BDPA New York (Dec 2010)Newsletter: BDPA New York (Dec 2010)
Newsletter: BDPA New York (Dec 2010)
 
Road to National BDPA HSCC Championship
Road to National BDPA HSCC ChampionshipRoad to National BDPA HSCC Championship
Road to National BDPA HSCC Championship
 
Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1
 
Apostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteApostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parte
 
Buscador OCW
Buscador OCWBuscador OCW
Buscador OCW
 
Matematik ders-anlatimi
Matematik ders-anlatimiMatematik ders-anlatimi
Matematik ders-anlatimi
 
Relacionamento
RelacionamentoRelacionamento
Relacionamento
 
Mont taber
Mont taberMont taber
Mont taber
 

Ähnlich wie Federal IT Initiatives - BDPA Conference Executive Panel

Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 

Ähnlich wie Federal IT Initiatives - BDPA Conference Executive Panel (20)

Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

Mehr von BDPA Education and Technology Foundation

Mehr von BDPA Education and Technology Foundation (20)

Oracle Scholarship for BDPA Students
Oracle Scholarship for BDPA StudentsOracle Scholarship for BDPA Students
Oracle Scholarship for BDPA Students
 
BDPA and College Students
BDPA and College StudentsBDPA and College Students
BDPA and College Students
 
Eli Lilly Scholarship for BDPA Students (2018)
Eli Lilly Scholarship for BDPA Students (2018)Eli Lilly Scholarship for BDPA Students (2018)
Eli Lilly Scholarship for BDPA Students (2018)
 
Johnson & Johnson Scholarship (2018)
Johnson & Johnson Scholarship (2018)Johnson & Johnson Scholarship (2018)
Johnson & Johnson Scholarship (2018)
 
flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair
 
Nomination form * BDPA Cincinnati (2017)
Nomination form * BDPA Cincinnati (2017)Nomination form * BDPA Cincinnati (2017)
Nomination form * BDPA Cincinnati (2017)
 
Newsletter: BDPA Memphis (June 2017)
Newsletter: BDPA Memphis (June 2017) Newsletter: BDPA Memphis (June 2017)
Newsletter: BDPA Memphis (June 2017)
 
Newsletter: BDPA Washington DC (May 2017)
Newsletter: BDPA Washington DC (May 2017) Newsletter: BDPA Washington DC (May 2017)
Newsletter: BDPA Washington DC (May 2017)
 
Oracle Scholarship for BDPA Students
Oracle Scholarship for BDPA StudentsOracle Scholarship for BDPA Students
Oracle Scholarship for BDPA Students
 
Wanda Everett BDPA Scholarship
Wanda Everett BDPA ScholarshipWanda Everett BDPA Scholarship
Wanda Everett BDPA Scholarship
 
BDPA Technology Conference Flyer (2017)
BDPA Technology Conference Flyer (2017)BDPA Technology Conference Flyer (2017)
BDPA Technology Conference Flyer (2017)
 
2017 BDPA Individual PACEsetter Awards Program
2017 BDPA Individual PACEsetter Awards Program2017 BDPA Individual PACEsetter Awards Program
2017 BDPA Individual PACEsetter Awards Program
 
Top Companies for Blacks in Technology `
Top Companies for Blacks in Technology `Top Companies for Blacks in Technology `
Top Companies for Blacks in Technology `
 
flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fairflyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair
 
BDPA Cincinnati Computer Camp Orientation (2017)
BDPA Cincinnati Computer Camp Orientation (2017)BDPA Cincinnati Computer Camp Orientation (2017)
BDPA Cincinnati Computer Camp Orientation (2017)
 
BDPA Connect Virtual Career Fair
BDPA Connect Virtual Career FairBDPA Connect Virtual Career Fair
BDPA Connect Virtual Career Fair
 
Overview-SITES_Triangle-2016
Overview-SITES_Triangle-2016Overview-SITES_Triangle-2016
Overview-SITES_Triangle-2016
 
National BDPA Mobile Application Showcase
National BDPA Mobile Application ShowcaseNational BDPA Mobile Application Showcase
National BDPA Mobile Application Showcase
 
ITSMF Educational Scholarship
ITSMF Educational ScholarshipITSMF Educational Scholarship
ITSMF Educational Scholarship
 
2016 Golf Classic Trifold
2016 Golf Classic Trifold2016 Golf Classic Trifold
2016 Golf Classic Trifold
 

Kürzlich hochgeladen

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 

Kürzlich hochgeladen (20)

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 

Federal IT Initiatives - BDPA Conference Executive Panel

  • 1. EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”
  • 2.
  • 3.
  • 4.
  • 5. Federal IT Initiatives: What's Next? Are you ready? Tony McMahon 7/19/2010 BDPA 2010 National Conference Executive Panel Discussions
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Sources Sources: IRS Statistics of Income: http:// www.irs.gov/taxstats/index.html Congressional Budget Office http:// www.cbo.gov / Office of Management & Budget http:// www.whitehouse.gov/omb / HIRE ACT: http://www.irs.gov/newsroom/article/0,,id=220326,00.html
  • 11.
  • 12. BDPA Symposium, Philadelphia Network Centricity 2020 Bob Whitkop Exec Director, NGEN SPO (202)213-7858 Technology in Motion: The changing shapes of the Cloud
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Office of Naval Research (ONR) Funding Opportunity Announcement # 10-023 Deadline September 30, 2011
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”

Hinweis der Redaktion

  1. Deliver web services – reduce deployment time for new web services by at least 25% Reduce O&M costs/ increase capacity – 15% increase in capacity Transform IT procurement – lower active category managed spend by at least 10% Effectively address risk management – ensure IT is not a barrier to business continuity Complete industry standard web platform – reduce platform cost by at least 30% in first year Simplify governance – increase capacity of internal processes by at least 30% Pilot and launch new end user technologies – at least one meaningful pilot per year Improve end user support – improve resolution time by 10% Complete CADE2 - improve the use of data to drive decision making across the agency Radically rationalize Application portfolio – reduce on-going application maintenance costs by at least 25% Provide standardized services 25% lower TCO for deployed solutions (e.g., storage) Build internal capability – networks, operations, architecture, cybersecurity, planning Utilize cost and performance data transparency throughout IT – have linked, cascading metrics from CTO to first line managers Partner with the business to more effectively plan demand – drive top down coordination across projects and investments to align and team against all initiatives
  2. Build internal capability – networks, operations, architecture, cybersecurity, planning Utilize cost and performance data transparency throughout IT – have linked, cascading metrics from CTO to first line managers Partner with the business to more effectively plan demand – drive top down coordination across projects and investments to align and team against all initiatives
  3. *Dark cloud: Study finds security risks in virtualization By Kathleen Hickey Mar 18, 2010 http://fcw.com/articles/2010/03/18/dark-cloud-security.aspx Government IT upgrade projects may soon have a new wrench thrown into the works. According to recent research from Gartner, 60 percent of virtual servers are less secure than the ones they replace. The situation is slated to continue through the end of 2015, when the number of insecure virtual servers is expected to drop to 30 percent. "Virtualization is not inherently insecure," said Neil MacDonald, Gartner fellow and vice president. "However, most virtualized workloads are being deployed insecurely. The latter is a result of the immaturity of tools and processes and the limited training of staff, resellers and consultants." Numerous state, local and federal agencies have moved or are moving to virtual servers, including the state of California and the Energy Department. While Gartner estimated that only 18 percent of enterprise data center workloads had been virtualized at the end of 2009, that number is expected to grow to more than 50 percent by the close of 2012. One of the major causes of this issue is a lack of involvement of the IT security team in the architecture and planning stages of development, Gartner said. About 40 percent of the surveyed organizations had not brought security professionals into the projects. Related coverage: IBM launches public cloud service Agencies help test cloud-based file storage system Another risk is that the virtualization layer could compromise all hosted workloads, with hackers already targeting this layer, Gartner said. Gartner recommends keeping the layer as “thin as possible, while hardening the configuration to unauthorized changes." Organizations should not rely on host-based security controls, the report states. Other risks include a lack of visibility and controls on internal virtual networks, which are not visible to network-based security protection devices, such as network-based intrusion prevention systems, and consolidations of workloads of different trust levels on the same physical server without adequate separation. There is also the potential for inadequate administrative access controls and administrative tools for the hypervisor/virtual machine manager layer. Finally, a potential loss of separation duties for network and security controls could lead to inadvertently allowing users to gain access to data that exceeds their normal privilege levels. To address these risks, Gartner recommended treating the virtual network as similar to a physical one, with the same kind of monitoring and separation of workloads and the same team handling both. Additionally, organizations should isolate virtual desktop workloads from the rest of the physical data center and restrict access to the virtualization layer.
  4. **Social media opens new door to cyberattacks, panel says Malware is now No. 1 cybersecurity threat, according to survey By David Hubler Mar 24, 2010 http://washingtontechnology.com/articles/2010/03/24/social-media-cyber-attacks.aspx E-mail attachments are no longer the attack of choice of computer hackers and other individuals intent on gaining access to government and industry systems, security experts said today. As increasing numbers of people adopt social media, those sites are becoming the new attack portal of choice and malware is now the No. 1 threat, panelists said at the FOSE 2010 trade show in Washington, D.C. Two or three years ago, the No. 1 vector for viruses was through e-mail, primarily attachments. But today those attacks account for “the low end of single digits,” said Bob Hansmann, senior product marketing manager at Blue Coat Systems. “ The vast majority of attacks actually come through the Web, and yet it is amazing how few people actually scan their http or https, their secure connections to Web mail,” he said. A recent survey found that the number of people who have accounts at social networking sites, such as Facebook and MySpace, is 10 percent greater than the number of people who have e-mail accounts, Hansmann added. “ That’s where all this malware is coming from,” he said. “People have to start looking beyond e-mail and do something at the gateway. You can’t trust the desktop.” The top three IT security issues today are malware, inappropriate employee activity or network use, and issues related to remote Web access, said Andy Lausch, vice president of CDW Government, citing a recent CDW-G survey. “ The potential for incidents grew dramatically over the past year,” Hansmann said. “We saw the number of malware [incidents] double. Phishing attacks went up 600 percent in 2009.” “ We’re just seeing more attacks so we are seeing more incidents,” he said, adding that although Web 2.0 is not a new technology, it has changed the way people use the Internet. “ A lot of users don’t know how to protect themselves,” he said. He called for more education and increased spending for the new kinds of defenses that are needed, such as better URL filtering There’s a cybersecurity tools gap, said Stan Oien, manager of security practices at CDW-G. Government agencies “fully need to figure out where their gaps are,” he said. “Start with an assessment. Try to get an assessment of the environment. That will give you a baseline, and in that way, you can kind of build your plan moving forward.” “ All too often I see a lot of customers and a lot of agencies that actually don’t even know where their gaps are,” Oien added. “Threats are going to be changing. They’re ever-evolving and becoming much more complex.” The panelists suggested that agencies and contractors consider cloud computing as one way to reduce the number of cyberattacks.