It is essential for agencies to investigate the causes and consequences of cyberattacks after they occur. But those investigations must avoid political interference and overreach.
Search Results for: cio
6 Steps to Build an External Awards Strategy
Building and implementing an external award strategy is a powerful tool for enhancing morale, recognizing your workforce and fostering a positive work environment.
Building a Culture of Cyber Literacy
Cyber literacy is essential for addressing the current cyber threat landscape — for everyone in your organization.
Tampa Mapped Its Most Dangerous Roads to Reduce Deadly Incidents
In Tampa, GIS technology was used to model hazardous traffic corridors. With pedestrians especially at risk of death and injury, leaders wanted to find root causes and design solutions with equity in mind.
Share What You Know – It’s Part of Leading Change
These days leaders are on the hook to be more transparent — because in many ways they don’t have a choice. The best advice, then: be intentional about how you are being transparent.
Evolving IT Staffing for Low-Code Platforms in Government
Low-code platforms aren’t necessarily the domain of your senior programmers. It makes sense to use junior programmers and business analysts to implement this new technology.
What’s Going on in State & Local?
State and local governments face many challenges and opportunities. Here are some ways they’re meeting them now.
How State and Local Government Can Bolster Election Security
In an age of mis-, dis-, and mal-information, election officials need the public to believe they’re doing all this securely, because election integrity isn’t just about accurately counting votes.
5 Ways to Improve Cross-Government Cyber Collaboration
Cyber criminals don’t care about jurisdictional borders. Governments need to collaborate to keep everybody safe. Here’s some advice on how to do it.
Avert Disaster: How to Make Data & Systems More Resilient
When disaster strikes, whether because of a natural event or as a result of someone’s malicious intent, an agency must be prepared to bounce back — quickly. This takeaway resource features advice from the following government and industry experts who shared insights on approaches to being prepared for anything: Frank Indiviglio, Chief Technology Officer at the NationalRead… Read more »