Search Results for: cio

How Can You Combat Insider Threats?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. Insider threats can have severe consequences, with victim organizations facing significant costs and damages. According to the FBI, the averageRead… Read more »

You Need a Gossip Strategy

Public servants have a hard enough time without giving each other grief. And yet, how many of us are guilty of taking part in office gossip? I try to be a Good Human, but I sometimes fail. And I sometimes gossip. Reflecting on this, I’ve realized that I had no “Gossip Strategy”. Now I do.Read… Read more »

Let’s Convert Lessons Observed into Lessons Learned

There’s a strong desire in the Federal Government to not only find innovative technologies – but to find innovative technology companies not presently doing business with the Federal Government. The Administration signaled the desire to find them and agencies, everywhere, are on the hunt. DC echoes with conversations about how to conduct market research toRead… Read more »

3 Best Practices for Securing Confidential Data

With organizations creating more documents and data by the minute, it’s essential now more than ever before that agencies look at how to protect all of their information. That’s why many agency leaders are now exploring Data Loss Prevention (DLP) solutions. DLP helps organizations discover, monitor, protect and manage information, particularly sensitive data, wherever itRead… Read more »

Tactics of the Ideal Cyber Workforce

With constant emerging technologies and our increasing dependence on electronic devices, cybersecurity affects everyone. Whether it is highly confidential data that you handle at your workplace or your personal banking information, you probably have some form of electronic information that you’d like to keep private and secure. We all need cybersecurity knowledge. For cyber professionals,Read… Read more »

The Surprising Missing Link in Your Organization’s IT Security Strategy

Pop quiz: what’s the biggest cybersecurity threat to your IT system? A. Inadequate security technology B. Malicious employees C. You It might surprise you to learn the answer is often C. In light of the seemingly never-ending string of data breaches and cyber attacks in the news – from Target, to Home Depot, to celebrityRead… Read more »

Only Lawyers To Prosper After Epic IT Failure

What’s an early clue that your IT project is in trouble? Perhaps when “a group of … employees took a 60-day ‘retreat’ for the express purpose of articulating the project’s requirements, and they returned empty-handed”?[1] Or when you learned that critical project-related decisions were “going to be made by a group of inexperienced people, whoRead… Read more »

What Are Your Pillars of Greatness?

Everyone has about five very specific things that provide the foundation of their life. I call these things “Pillars.” They are the five key things that matter most to you. And, they are the place you live your life from… whether you are aware of it or not. When you deliberately focus your attention onRead… Read more »

Community Blog

Filed under: Uncategorized

You Have No Choice – You Must Run Your Marathon

“People are as individual as snowflakes, they kinda look alike but no two are the exactly the same, and all classification is the root of prejudice.” ― Craig Ferguson, host, “The Late Late Show“ I’ve been a creative as long as I can remember. Writing, photography, slideshows, web, social media, fashion design, PR, writing for magazines,Read… Read more »

You Can Map That?

When you think of maps most people automatically think about directions. The most obvious reason to look at a map is to figure out how to get somewhere. If you are anything like me – the directionally challenged – you can spend hours pouring over a route in an effort not to get lost. But directionsRead… Read more »