5 Tips for Improved Digital Asset Security
Here are five in-house steps government agencies can take to help create a stronger line of defense from unknown cyberthreats.
Here are five in-house steps government agencies can take to help create a stronger line of defense from unknown cyberthreats.
To better understand the role technology, specifically data analytics, will play in rolling out the 2020 census, GovLoop sat down with Lisa Blumerman, Associate Director for Decennial Census Programs.
Data analytics is a hot topic in government and one that continues to gain traction. Agencies are increasingly relying on analytics to help fight diseases, combat fraud, improve citizen services and more. To better understand how the Centers for Disease Control and Prevention is using analytics, we heard from Ana Penman-Aguilar, Associate Director for ScienceRead… Read more »
Amid increasing natural disasters and cybersecurity threats, state and local governments need business continuity plans to minimize disruptions to employees, citizens and IT resources.
This Q&A is part of a new GovLoop series called “CIO Conversations.” Throughout 2018 we’ll feature conversational interviews twice a month with current and former federal, state and local chief information officers to get to know the people behind the titles. You’ll learn about the perks and challenges of their job, how they ended upRead… Read more »
The ability to quickly and effectively share information across the criminal justice system can be a matter of life or death.
Like many state and local enterprises, Louisiana is grappling with various legacy systems. Some are almost 40 years old, and with each comes countless applications.
Succession planning is one of those critical tasks that organizations know they need to do. But few do it well — if at all.
One perk of the MGT Act that’s often touted is the $500 million fund it would create, but some IT leaders say the real value will come from newly created working capital funds at each agency.
There are billions of dollars’ worth of hardware and software in use across government that is either obsolete or on the verge of lacking vendor support.