Weekly Round-up: September 5, 2014

John Kamensky Fix, Don’t Kill Telework. Eyebrows have been raised over perceived misuse of telework at the Patent and Trademark Office. But Jeffrey Neal, a former chief human capital officer at Homeland Security, tells Federal News Radio that “Rather than attempting to reverse telework programs, we should be working on fixing the problems. Nothing I have experienced, heard from people currently in government, or read tells me telework and other workplace flexibilities should be killed. . . .

Weekly Roundup March 11, 2016

The topics Obama plans to hit -- and avoid -- at SXSW. When President Barack Obama makes history as the first sitting president to appear at the South by Southwest music, film and technology conferences, he'll likely be talking up public service but he doesn't plan to focus on federal hiring issues or the ongoing encryption debate.

 

Lessons in Cybersecurity: What I Learned at RSA

The RSA Conference (http://www.rsaconference.com/2011/usa) hosts the leadership and a large swath of the membership of the cybersecurity world.  Key figures speak at plenary sessions, including White House Cybersecurity Coordinator Howard Schmidt, Cyber Command Director Keith Alexander, Deputy Secretary of Defense Bill Lynn, DHS Deputy Under Secretary Phil Reitinger, and NIST Director Pat Gallagher.  A much larger number participate in panel sessions and informal discussions.  I moderated a panel around the challenges that security and pri

Creating a Dynamic and Agile IT Enterprise: Insights from Dr. David Bray, Chief Information Officer, Federal Communications Comm

In 2013 the Federal Communications Commission (FCC) embarked on an ambitious effort to modernize its information technology infrastructure, transforming from an agency with 207 different IT systems to one with a cloud-based common data platform that would play a signifi- cant role in creating a more dynamic and agile enterprise.

A Best Practices Guide to Information Security

Organizations take great pains to use technology to defend against outside attacks; they work hard to spot and stop the malicious insider who is willfully trying to do ill to systems. However, most organizations fall short in equipping their workers with best practices to make them part of the solution to information security.