security

 

security

OMB’s Recent CIO Memorandum: Clarifying and Reinforcing CIO Primary Responsibilities

Wednesday, August 31st, 2011 - 7:56
By: 
Wednesday, August 31, 2011 - 07:52
Earlier this month, OMB Director Jacob Lew released a memorandum for the heads of all Federal Departments and Agencies, which focused on four areas for which all Federal Chief Information Officers (CIOs) have authority and “a lead role”: Governance, Commodity IT, Program Management, and Information Security.  The Memorandum further reinforced responsibilities of the Federal CIO Council to manage the Federal IT portfolio across agency boundaries.

Perspectives on Power, Security, and Leadership with General Anthony Zinni (USMC Ret.)

Wednesday, August 3rd, 2011 - 15:29
Wednesday, August 3, 2011 - 14:53
Aspects of Power in 21st Century World PoliticsI think we have to understand how much the world has changed in the last two decades, beginning with the fall of the Soviet Union. It’s much more interdependent because of globalization, the rise of information technology, and the migration of peoples. There have been power shifts.

Perspectives on the Future of Power, Security, and Leadership with Professor Joseph S. Nye, Jr., Harvard University

Wednesday, July 20th, 2011 - 16:13
Wednesday, July 20, 2011 - 15:02
Power and its Dimensions in 21st Century World Affairs - Power is simply the ability to affect others to get the things you want. There are three ways to make this happen. You can threaten people with coercion: sticks. You can pay them: carrots. We sometimes talk about power as though it’s just twisting arms, but that’s not accurate.

Seven Management Imperatives: Imperative Five - Respond to the New Security Environment

Monday, July 18th, 2011 - 9:06
Monday, July 18, 2011 - 09:02
  Government leaders and managers have a fundamental responsibility to protect citizens from security threats. The weapons and tactics employed in many of today’s security threats do not require the traditional armies of the past. Malicious groups of people, down to a hostile individual operating within the homeland, can acquire and employ commercially available technology to inflict major destruction. 

“Secure Transparency”: Why Cybersecurity is Vital to the Long-Term Success of Open Government

Thursday, June 9th, 2011 - 14:16
Posted by: 
At first glance, these initiatives appear to cover divergent topics, with only technology as a common element. Upon closer review, the advantages that open government creates will only be sustained through appropriately secure and agile information flows within and outside government.

Seven Management Imperatives

Wednesday, June 8th, 2011 - 22:11
Posted by: 
Based on these insights and trends, this forum presents seven management imperatives that government leaders and public managers must pursue in order to successfully manage in this new environment.

From the Executive Director

Wednesday, June 8th, 2011 - 15:21
Posted by: 
Making these connections requires assessing information of all types, often from disparate sources, to provide a foundation for strategic and tactical decision-making and insight to those who can make decisions and take action.

Energy Wrap Up: An Energy Management Program That Can Be Applied to the Federal Government

Friday, June 3rd, 2011 - 15:54
Friday, June 3, 2011 - 15:50
In the past few months, the budget has been a huge topic of discussion and federal agencies across the board have programs on the chopping block. In our previous posts, we’ve described energy challenges faced by federal organizations and the importance of adopting energy management initiatives—and these are powerful ways to reduce costs.

Energy Part 2: The Framework of a Successful Energy Management Program (EMP)

Thursday, June 2nd, 2011 - 15:09
Thursday, June 2, 2011 - 15:06
 In the last post, we used IBM BTV as an example of how the goal to increase reliability and to become more competitive in the chip manufacturing market evolved into a terrific Energy Management Program (EMP). In this post, we’ll describe the high-level nuts and bolts of an EMP, and how it can be applied to federal agencies to help cut costs, reduce CO2, and wean the country from its dependence on foreign oil. 

Think Globally, Act Locally: Implications of the International Cyberspace Strategy for Federal Leaders and Managers

Thursday, May 19th, 2011 - 9:36
By: 
Thursday, May 19, 2011 - 09:12
On Monday, at an event with the Secretaries of State, Commerce, Homeland Security, the Attorney General, and the Deputy Secretary of Defense, the Obama Administration released its international strategy for cyberspace.  The strategy, described in a post from White House Cyber Coordinator Howard Schmidt, for the first time outlines a number of principles that the US will fol
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

1485 recommendations
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

1817 recommendations
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

1133 recommendations