Mobile Performance Support and Training within the U.S. Federal Government
|
|
- Silvia Barber
- 5 years ago
- Views:
Transcription
1 606 Mobile Performance Support and Training within the U.S. Federal Government June 21 23, 2011 San Jose, CA John Low, Carney, Inc.
2
3 D0D: 242+ Fed: 124+ Army: 232+ NASA 10+ SI 8+ NIH 42+
4
5 There are over 24,000 websites across the federal government, yet the fastest growing marketis in mobile computing, U.S. Chief Information Officer Vivek Kundra
6 40 percent of Americans accessed the Internet, or instant messaging on a mobile phone in 2010, up from 32 percentin Pew Research Centers Study
7 By 2014, more people will access the Internet on mobile devices than on desktop PCs. Morgan Stanley Research
8 estimated that a simple application costs about $50,000, a midsize application costs $100,000, and a complex application with gaming features might cost $500,000. Gwynne Kostin-Director of Mobile Applications at GSA s Office of Citizen Services and Innovative Technologies
9 Patriot Missile Training: Created by: C2 Created for: U.S. Army Uses Unity3D and video ios 7 apps contracted Augments IMI
10 IRS2Go: More than 250K downloads ios and Android Developed in-house Cost 50K 1/3 budget on security
11 MyDS: Cost about 80K ios Managed by agency, developed by vendor
12 MyTSA: More than 200K downloads ios and web Developed in-house Cost about 100K
13 National Archives: Developed with Foursquare Developed in-house Cost 120 hours
14 MIM View CT, MRI, PET images on ios device Developed by industry First FDA approved app
15 D0D: 242+ Fed: Army: 232+ NASA 10+ SI 8+ NIH 42+ NIH: 150 grants,$36 million
16 VDC Research Group
17 D0D: 242+ Army: 232+
18 Market Drivers Ground Soldier initiatives Vehicle modernization Maintenance Border protection Next gen situational awareness apps
19 CSDA Connecting Soldiers to Digital Applications ARCIC -CIO/G6 TRADOC
20 Army Capabilities Integration Center 8 Pilot projects Training and Operations
21 FA53 Credit: Lt. Col. Gregory Motes, Chief of the Mobile Applications Branch
22 While many of the Apps so far have been paper reducers by uploading already printed material for the ease of using a smart phone, there are numerous possibilities for future development for military use. Lt. Col. Gregory Motes, Chief of the Mobile Applications Branch
23 Credit: Lt. Lt. Col. Col. Gregory Motes, Chief of of the the Mobile Applications Branch
24 58+ Apps
25
26 2012
27 The Army would like to field the mobile application in 30 days, but to do so, the service needs to develop an infrastructure and standards to support such development. Lt. Gen. Jeffrey Sorenson,
28 Future Mobile Applications Branch
29 Army Trends Develop for multiple formats Push for web-apps Expect that future DL will have a mobile component Moving from ad hoc to a formalized development process
30 Security ios A few months off from NIST certification Android will follow Data in transit, data at rest Apple on base working hand and hand with Army Legal departments terms of service agreements with end users
31 Not over yet
32 508 Currently there are no explicit rules for mobile, so agencies are following website guidance Agencies are sensitive to being 508 compliant with their apps ios recognized as a leader in accessible mobile for now due to voice access
33 Section 508 Compliance in a Web 3.0 World - Accessibility of Apps, Tweets and More May 18
34 I have tried usagov, my tsa, all recalls, uvdetector, white house, flex fuel. I am using a iphone4 with voice over and I am a totally blind user. I was able to use all the apps except for the usagov. Tester and Federal Employee
35 I have recently tested an application for Section 508 conformance here at the Department of Veterans Affairs. It is an app to help with the symptoms of PTSD. Although there were some problems with it in its original form, they were quickly corrected. It has been my experience, using the iphone as a blind person, that is should not be difficult to make many mobile apps at least, for the iphone Section 508 compliant. 508 Test Engineer VA
36
37 What does the future hold?
38 Expect mobile development as an adjunct to IMI Web apps will likely be the preferred approach for training for now In a post CSDA Army, Acquisition is being formalized Government is encouraged to work more with industry for future app development
39 Emergence of Government specific market places Formalized guidance for 508 and mobile with the release of updated guidelines Continued growth in public health and medicine apps
40 A Simple Framework
41 Mobile Technology Strata
42 John Low Mobile Performance Support and Chief Creative Officer, Carney Inc. Training within the U.S. Federal Government
ISOO CUI Overview for ACSAC
ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationGSA Renewable Energy Purchasing Update
U.S. General Services Administration Northwest/Arctic Region GSA Renewable Energy Purchasing Update Indian Country Energy & Infrastructure Working Group George Northcroft, Regional Administrator & GSA
More informationFederal & NASA IPv6 Updates
Federal & NASA IPv6 Updates LinkedIn Headquarters Sunnyvale, CA Kevin L. Jones NASA IPv6 Transition Manager April 26, 2017 December 1, 2016 September 28, 2010 OMB Memo USG IPv6 Implementation Goals 1.
More informationEmerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI Web Hull Privacy, Data Protection, & Compliance Advisor
Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.
More informationTopics 4/11/2016. Emerging Challenges in mhealth: Keeping Information Safe & Secure. Here s the challenge It s just the beginning of mhealth
Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.
More informationFederal Technology Transfer Mechanisms Matrix A reference guide to technology transfer mechanisms websites
Federal Technology Transfer Mechanisms Matrix A reference guide to technology transfer mechanisms websites About the Matrix Listing by Mechanism In order to facilitate the technology transfer efforts of
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationStatement of Organization, Functions, and Delegations of Authority: Office of the
This document is scheduled to be published in the Federal Register on 07/27/2016 and available online at http://federalregister.gov/a/2016-17737, and on FDsys.gov 4184-40P DEPARTMENT OF HEALTH AND HUMAN
More informationWhy is the CUI Program necessary?
Why is the CUI Program necessary? Executive departments and agencies apply their own ad-hoc policies and markings to unclassified information that requires safeguarding or dissemination controls, resulting
More informationRisk Management Framework for DoD Medical Devices
Risk Management Framework for DoD Medical Devices Session 136, March 7, 2018 Lt. Col. Alan Hardman, Chief Operations Officer, Cyber Security Division, Office of the DAD IO/J-6 William Martin, Deputy of
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationThe U.S. Government s Role in Standards and Conformity Assessment
The U.S. Government s Role in Standards and Conformity Assessment ASTM International-Russian Federation on Technical Regulating and Metrology Coordinated Program Mary Saunders Chief, Standards Services
More informationMoving Data through Early Planning into Design and Operations
Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.
More informationAccenture Texas. Delivering High Performance in Health & Public Service
Accenture Texas Delivering High Performance in Health & Public Service Global reach. Texas touch. Accenture is a global management consulting, technology services and outsourcing company, with more than
More informationUSGv6: US Government. IPv6 Transition Activities 11/04/2010 DISCOVER THE TRUE VALUE OF TECHNOLOGY
USGv6: US Government Dale Geesey Chief Operating Officer Auspex Technologies, LLC Phone: 703.319.1925 Fax: 866.873.1277 E-mail: dgeesey@auspextech.com Web: www.auspextech.com IPv6 Transition Activities
More informationCompetency Definition
Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability
More informationCO-OP Mobile: Mobile App for ipads. April 18, 2013
CO-OP Mobile: Mobile App for ipads April 18, 2013 1 Today s Presenters DIANEZABLIT Product Marketing Manager RANDYTHOMPSON Senior Product Manager 2 Agenda Marketplace Mobile Trends CO-OP Mobile Overview
More informationDialogic PowerVille CC Cloud Centrex
Dialogic PowerVille CC Cloud Centrex Cloud-based Feature-rich Integrated VoIP Solution for Business and Residential Customers Dialogic s PowerVille Cloud Centrex is a carrier-class solution that enables
More informationJ & B Hartigan, Inc. Carrollton VA ABOUT US
Carrollton VA 23314 757-214-4341 ABOUT US J&B Hartigan, Inc. (JBH) is a privately held, CVE certified Service Disabled Veteran Owned Small Business (SDVOSB), we were founded in 2002 and incorporated in
More informationProtecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizations
Protecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizations January 9 th, 2018 SPEAKER Chris Seiders, CISSP Security Analyst Computing Services and Systems Development
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationHealth Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved?
Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved? Use cases, best practice and examples for successful implementations 1 Agenda Overview of The
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure:
This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14553, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationCategory Management and the Acquisition Gateway
Category Management and the Acquisition Gateway Breakout Session #: A17 Andrea Azarcon Heller, Acting Director of Stakeholder Management Division, Office of Strategy Management Date: Monday, June 25 Time:
More informationNISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015
NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationICGI Recommendations for Federal Public Websites
Get Email Updates Change Text Size A - Z Index Contact Us About Us Site Policies Suggest Content WEB CONTENT SOCIAL MEDIA MOBILE CHALLENGES & CONTESTS CONTACT CENTERS CUSTOMER Training EXPERIENCE Communities
More informationState of US Telemedicine Industry
State of US Telemedicine Industry Prepared for ETSI Sophia Antipolis, France 6 May 2014 Agenda Current State of Healthcare in the US Industry dynamics Adoption of telemedicine/mhealth/digital health Healthcare
More informationElectronic Records Archives: Philadelphia Federal Executive Board
Electronic Records Archives: Philadelphia Federal Executive Board L. Reynolds Cahoon Assistant Archivist for HR and IT and Chief Information Officer 18 March 2004 Agenda (The Mission) Electronic Records
More informationGlobal Working Group on Optical Disk Archive Testing. OPTICAL STORAGE SYMPOSIUM 2005 Hosted by the Optical Storage Trade Association
Global Working Group on Optical Disk Archive Testing OPTICAL STORAGE SYMPOSIUM 2005 Hosted by the Optical Storage Trade Association September 28 th, 2005 Hyatt Regency, San Francisco Airport Burlingame,
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationITMC NACO SUMMIT MARCH 3, 2012 HAROLD TUCK CHIEF INFORMATION OFFICER COUNTY OF SAN DIEGO
ITMC NACO SUMMIT MARCH 3, 2012 HAROLD TUCK CHIEF INFORMATION OFFICER COUNTY OF SAN DIEGO County of San Diego County Overview Population 3.1 M Second largest County in CA Fifth largest County in U.S. Total
More informationThe U.S. Manufacturing Extension Partnership - MEP
The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/
More information2011 NASCIO RECOGNITION AWARDS NOMINATION CATEGORY: FAST TRACK SOLUTIONS CALIFORNIA MOBILE DEVELOPMENT PROGRAM STATE OF CALIFORNIA
2011 NASCIO RECOGNITION AWARDS NOMINATION CATEGORY: FAST TRACK SOLUTIONS CALIFORNIA MOBILE DEVELOPMENT PROGRAM STATE OF CALIFORNIA OFFICE OF TECHNOLOGY SERVICES CALIFORNIA TECHNOLOGY AGENCY 1 B. EXECUTIVE
More informationDOE OFFICE OF INDIAN ENERGY Program Overview May 5, Chris Deschene, Director
DOE OFFICE OF INDIAN ENERGY Program Overview May 5, 2017 Chris Deschene, Director Reality of 567 Federally Recognized Tribes Staggering gaps between Indian Country and the rest of the U.S. American Indian
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationAgency Guide for FedRAMP Authorizations
How to Functionally Reuse an Existing Authorization Version 1.0 August 5, 2015 Revision History Date Version Page(s) Description Author 08/05/2015 1.0 All Initial Publication FedRAMP PMO 06/06/2017 1.0
More informationGovernance for the Public Sector Cloud
Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationMobile Learning Trends & Realities. Tamar Elkeles, Ph.D. Chief Learning Officer
1 Mobile Learning Trends & Realities Tamar Elkeles, Ph.D. Chief Learning Officer Qualcomm s business Enabling the next evolution of wireless through Technology licensing Chipsets and system software Wireless
More informationArchitecting for Resiliency Army s Common Operating Environment (COE) SERC
Architecting for Resiliency Army s Common Operating Environment (COE) SERC 5 October 2011 Mr. Terry Edwards Director, ASA(ALT) Office of the Chief Systems Engineer (OCSE) (703) 614-4540 terry.edwards@us.army.mil
More information\\amr-web04\inetpub\wwwroot\new.nascio.org\portals\0\awards\nominations2003\2003\2003northdakota1.docpage 1 of 6
Title of Nomination: North Dakota Web Accessibility Project/System Manager: Dennis Klipfel Title: IT Business Analyst Agency: North Dakota Information Technology Dept Department: Same Address: 600 E Blvd
More informationOpen Source
Open Source Software @EC and EU-FOSSA 2 Marek Przybyszewski and Saranjit Arora DIGIT Directorate-General for European Commission Open Source Summit Europe 2018 Edinburgh, 22-24 October 2018 Agenda Open
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationDr. Eng. Antonio Mauro, PhD October 20th 2011
October 20th 2011 NIST Cloud Computing Reference Architecture NIST Cloud Computing Standards Roadmap Special Publication 500-292 September 2011 Document: NIST CCSRWG 092 - First Edition - July 5, 2011
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationInformation Security Program Audit Introduction and Survival Guide
Information Security Program Audit Introduction and Survival Guide Cyber Security Symposium 2016, Sacramento Convention Center September 28, 2016 INTRODUCTION Welcome Presenters Background Carl Salmonsen,
More informationDialogic Cloud Centrex
Dialogic Cloud Centrex Cloud-based, feature-rich integrated VoIP solution for business and residential customers Dialogic Cloud Centrex is a carrier-class solution that enables service providers to offer
More informationUse of Standards and Conformity Assessment in U.S. Regulation: Perspective of the Private Sector
Use of Standards and Conformity Assessment in U.S. Regulation: Perspective of the Private Sector Standards Alliance Peru Workshop on Regulatory Decision Making October 29-30, 2014 Presentation Objectives
More informationRoles and Responsibilities on DevOps Adoption
Roles and Responsibilities on DevOps Adoption Hasan Yasar Technical Manager, Adjunct Faculty Member Secure Lifecycle Solutions CERT SEI CMU Software Engineering Institute Carnegie Mellon University Pittsburgh,
More informationCLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationTransatlantic Cybersecurity: The Need for Regulatory Coordination
Transatlantic Cybersecurity: The Need for Regulatory Coordination EU-US High Level Regulatory Cooperation Forum April 11, 2013 Bruce Levinson Levinson@TheCRE.com The Cybersecurity regulation will take
More informationLeveraging the LincPass in USDA
Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass
More informationTrina Gregory. Instructor
Trina Gregory Instructor Senior lecturer Software engineer for over 15 years Teaching at USC since Spring 2007 Email: trina.gregory@usc.edu or trinagre@usc.edu Office: OHE 412 Office hours listed on Blackboard
More informationOperated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA LANL s Multi-Factor Authentication (MFA) Initiatives NLIT Summit 2018 Glen Lee Network and Infrastructure Engineering
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationSmart Cards & Credentialing in the Federal Government
Smart Cards & Credentialing in the Federal Government Smart Card Alliance 13 Feb 2003 Salt Lake City Bill Holcombe GSA Office of Governmentwide Policy New Urgency for Credentialing Solutions Post 9/11
More informationMN.IT Services and MNsure
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT MN.IT Services and MNsure Presentation to Mnsure Executive Board State CIO Carolyn Parnell June 26, 2013 July 2005: Office of Enterprise Technology created.
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationVA REMOTE ACCESS (updated 12/20/16)
VA REMOTE ACCESS (updated 12/20/16) (PROBLEMS: CALL PIV NATL HELP DESK @ 855-673-4357, choose Option 6 and then Option 2) 1. REQUEST VA REMOTE ACCESS (YOU MUST BE AT THE DALLAS VA TO REQUEST): Go to https://vpnportal.vansoc.va.gov/selfservice/userlogin.aspx
More informationThe 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All?
The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All? January 15, 2013 Sponsored by: www.mobileworkexchange.com 1 Introduction The Digital Government Strategy calls for
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationJohnson Controls. A global diversified company in the building and automotive industries
A global diversified company in the building and automotive industries 131 Years of Innovation 2 Building Efficiency overview Expertise across the building lifecycle Building Lifecycle Plan & Assess Acquire
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationCASE STUDY CHIEF INFORMATION OFFICER GROUP
CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military
More informationEEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,
EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, 2008 www.morganlewis.com Overview Reliability Standards Enforcement Framework Critical Infrastructure Protection (CIP)
More informationProject/System Manager: John Forbes, ConneCT Management Advisory Committee (CMAC) Kathleen Anderson, CMAC Accessibility Subcommittee
Title of Nomination: State of Connecticut Web Accessibility Initiative Project/System Manager: John Forbes, ConneCT Management Advisory Committee (CMAC) Kathleen Anderson, CMAC Accessibility Subcommittee
More informationThe Aruba Mobile Virtual Enterprise for Government. The Next Generation Network Access Architecture for Mobile Technology
The Next Generation Network Access Architecture for Mobile Technology Table of Contents Government agencies recognize the benefits of mobility 3 MOVE: A user-centric, role-based access architecture for
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationStandards: Enabler of Sustainability
Standards: Enabler of Sustainability An Academic-Industry Workshop May 17, 2017 Mary H. Saunders Vice President, Government Relations and Public Policy Business Drivers of Sustainability Standards Use
More informationState IT in Tough Times: Strategies and Trends for Cost Control and Efficiency
State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency NCSL Communications, Financial Services and Interstate Commerce Committee December 10, 2010 Doug Robinson, Executive Director
More informationHow the SBIR/STTR Programs Help Grow Your Businesses
Click to edit Master title style How the SBIR/STTR Programs Help Grow Your Businesses 1 Click Jerry to Alfonso edit Master Miles, title Esq. style Experience Jerry Miles, a government contracts attorney
More informationOutline. Why protect CUI? Current Practices. Information Security Reform. Implementation. Understanding the CUI Program. Impacts to National Security
Outline Why protect CUI? Impacts to National Security Current Practices CUI Program & Existing Agency Practices Information Security Reform CUI Registry 32CFR2002 NIST SP 800-171 (Rev 1) Federal Acquisition
More informationUpdated: April, 2018 (see what s new) Table of Contents. Overview Switching from Maintenance to Subscription Pricing for Switching...
Important Updates on Maintenance Plans Frequently Asked Questions Customers This document answers frequently asked questions about maintenance plan changes as we move to one business model. Updated: April,
More informationVocera Secure Texting 2.1 FAQ
General Description Q. What is Vocera Secure Texting? A. Vocera Secure Texting (VST) combines convenience with privacy by providing a secure, easy to use, HIPAA-compliant alternative to SMS as well as
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationSTATE OF NEW JERSEY IT CIRCULAR
NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 Riverview Plaza E. Steven Emanuel, Chief Technology Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT
More informationControlled Unclassified Information (CUI) and FISMA: an update. May 12, 2017 Mark Sweet, Nancy Lewis, Grace Park Stephanie Gray, Alicia Turner
Controlled Unclassified Information (CUI) and FISMA: an update May 12, 2017 Mark Sweet, Nancy Lewis, Grace Park Stephanie Gray, Alicia Turner What is FISMA? Federal Information Security Modernization Act
More informationCommunity Resilience Innovation, Collaboration, Sustainability, Results. The Los Angeles Emergency Preparedness Foundation
Community Resilience Innovation, Collaboration, Sustainability, Results The Los Angeles Emergency Preparedness Foundation Community Resilience Life Cycle Community Resilience Framework Preparedness Dimensions
More informationDisaster Management (DM) Program Overview
Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and
More informationDHS Cloud Strategy and Trade Nexus. May 2011
DHS Cloud Strategy and Trade Nexus May 2011 IT Reform @ DHS Federal Plan Departmental Plan IT Reform @ DHS Action Item 1 Complete detailed implementation plans to consolidate 800 data centers by 2015 2
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationThe simplified guide to. HIPAA compliance
The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act
More informationGold: points Platinum: 80+ points. Certified: points Silver: points
What is LEED? LEED, or Leadership in Energy & Environmental Design, is redefining the way we think about the places where we live, work and learn. As an internationally recognized mark of excellence, LEED
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationVietnam: Current status of IT Policy and IT flagship Projects
Vietnam: Current status of IT Policy and IT flagship Projects Mr. Nguyen Phu Tien Deputy Director General Authority of Information Technology Application Ministry of Information and Communications, Vietnam
More informationGOVERNMENT WEBSITES 2018 GOVERNMENT WEBSITES REPORT CFI Group. All rights reserved.
GOVERNMENT WEBSITES REPORT 2018 1 CONTENTS INTRODUCTION 3 THE CHALLENGE: DELIVERING A SATISFYING VISITOR EXPERIENCE 4 To improve website performance, agencies should: 1 DESIGN FOR WAYFINDING 10 2 OPTIMIZE
More informationIntroduction to the Federal Risk and Authorization Management Program (FedRAMP)
Introduction to the Federal Risk and Authorization Management Program (FedRAMP) 8/2/2015 Presented by: FedRAMP PMO 1 Today s Training Welcome! This training session is part one of the FedRAMP Training
More information