Defining a Framework for Decision Making in Cyberspace

Wednesday, February 4th, 2015 - 11:33
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.

How Will Government Adapt?: Shifting Defense Priorities and Fiscal Realities

Tuesday, January 20th, 2015 - 15:03
Tuesday, January 20, 2015 - 13:59
In particular, the Department must focus on mitigating high-risk issues and inefficiencies, including data security and accessibility, base realignment, and cost of employee benefits. The Department has already made progress in employing a change management approach, but further effort is needed. In light of these challenges, the Department can seize the current opportunity to maximize its resources and cultivate more strategic enterprise-level leadership.

Achieving Cost-Effective, Mission-Based Cybersecurity: Using Risk Management and Analytics to Manage Vulnerabilities and Threats

Thursday, March 27th, 2014 - 6:36
Wednesday, March 26, 2014 - 11:27
Engaging leaders in protecting an organizations’ cyber, IT, and information assets is a critical starting point to effective security. A next logical step for any government or commercial organization is to leverage risk management and analytics to implement a mission-based security program. As organizations move forward, guidance from NIST and evolving capabilities in industry are merging to paint a path forward for agencies to follow.

Using the C-Suite to Manage your Risky Business

Monday, February 17th, 2014 - 10:01
Monday, February 17, 2014 - 08:51
As the world becomes more digitized and interconnected, the door to emerging threats and proprietary data leaks has opened wider. The number of security breaches affecting enterprises across numerous industries continues to grow, seemingly day-by-day. Once a topic restricted to the IT organization, it is now unquestionably a C-suite priority. A strong plan for risk management throughout the organization has become essential.

Previous Center Newsletters

Thursday, October 3rd, 2013 - 14:14
Interested in reviewing one of our previous newsletters?  Below is a listing of previous newsletters.  Sign up to receive our e-newsletters in the future. Enterprise Risk Management and How Inspectors General Work with Agencies and Congress - May 18, 2015
Cover Image: 

2012 Call for Research Report Proposals

Thursday, September 27th, 2012 - 14:38
Our aim is to produce research and analysis that helps government leaders more effectively respond to their mission and management challenges. The IBM Center is named "The Business of Government" because its focus is the management and operation of government, not the policies of government. Public sector leaders and managers need the best, most practical advice available when it comes to delivering the business of government. We seek to “bridge the gap” between research and practice by helping to stimulate and accelerate the production of actionable research.

Assessing the Value of Intelligence: Lessons for Leaders

Monday, May 14th, 2012 - 10:24
Applying power in all its forms to secure the present and future is ultimately a leadership challenge. That challenge is especially complex in the current century when the forms and patterns of security are changing in so many ways at an accelerated pace than ever before. The capabilities required to threaten a nation, region, or even global stability are available to both rich and impoverished nation states, as well as small networks of people who can and do operate relatively independent of any nation state. There is more data available than ever before to make sense of this era.

Malcolm Jackson

Thursday, March 1st, 2012 - 14:15
Mr. Jackson's leadership focus includes IT strategic planning and governance, IT investment management and government transparency.
Radio show date: 
Mon, 03/26/2012
Intro text: 
Malcolm Jackson

Malcolm Jackson

Thursday, March 1st, 2012 - 14:12
Malcolm D. Jackson is EPA’s Assistant Administrator for the Office of Environmental Information and Chief Information Officer. In this dual role, Mr. Jackson is responsible for IT operations and security, information quality and collection, and access to environmental information including the Toxics Release Inventory. His leadership focus includes IT strategic planning and governance, IT investment management and government transparency.

OMB’s Recent CIO Memorandum: Clarifying and Reinforcing CIO Primary Responsibilities

Wednesday, August 31st, 2011 - 7:56
Wednesday, August 31, 2011 - 07:52
Earlier this month, OMB Director Jacob Lew released a memorandum for the heads of all Federal Departments and Agencies, which focused on four areas for which all Federal Chief Information Officers (CIOs) have authority and “a lead role”: Governance, Commodity IT, Program Management, and Information Security.  The Memorandum further reinforced responsibilities of the Federal CIO Council to manage the Federal IT portfolio across agency boundaries.