SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”
FEDERAL IT INITIATIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
John James ,[object Object],[object Object],FEDERAL IT INITIATIVES
Tony McMahon ,[object Object],[object Object],FEDERAL IT INITIATIVES
Federal IT Initiatives: What's Next? Are you ready?  Tony McMahon 7/19/2010 BDPA 2010 National Conference Executive Panel Discussions
The IRS Importance -  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wave - 2 12-36 Months Wave 3 - 24-54 Months ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Sources Sources: IRS Statistics of Income:  http:// www.irs.gov/taxstats/index.html   Congressional Budget Office  http:// www.cbo.gov /   Office of Management & Budget  http:// www.whitehouse.gov/omb / HIRE ACT:  http://www.irs.gov/newsroom/article/0,,id=220326,00.html
Robert “Bob” Whitkop ,[object Object],[object Object],[object Object],FEDERAL IT INITIATIVES
BDPA Symposium, Philadelphia Network Centricity 2020 Bob Whitkop Exec Director, NGEN SPO (202)213-7858 Technology in Motion: The changing shapes of the Cloud
We have the Network! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
It’s the Data ‘Stupid’… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does the Data get there? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure at the Door ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Greening IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing as an Enterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Team Vision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bob Whitkop [email_address] (202)213-7858
Enterprise ITSM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Centers morph into  the Network! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web 2.0: Window to Virtual Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dr Anthony Junior ,[object Object],FEDERAL IT INITIATIVES
Office of Naval Research (ONR) Funding Opportunity Announcement # 10-023 Deadline September 30, 2011
ONR Mission and Goals of STEM: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
We are looking to support Education, Activity, and Outreach Programs that: ,[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
We are looking to : ,[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Sample Education and Outreach Programs: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Application Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Application Process ,[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
Points of Contact: ,[object Object],[object Object],[object Object],[object Object],[object Object],Funding Opportunity Announcement for Navy and Marine Corps STEM Programs - ONR FOA 10-023
FEDERAL IT INITIATIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”

Contenu connexe

Tendances

Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeIan Lee
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 

Tendances (18)

Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 

En vedette

Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)BDPA Education and Technology Foundation
 
Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Gabriel Rissi
 
Apostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteApostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteMayara Magna
 
Buscador OCW
Buscador OCWBuscador OCW
Buscador OCWbcriofrio
 
Matematik ders-anlatimi
Matematik ders-anlatimiMatematik ders-anlatimi
Matematik ders-anlatimizeynep_zyn36
 
Relacionamento
RelacionamentoRelacionamento
Relacionamentoemoc5
 
Mont taber
Mont taberMont taber
Mont taberCollaso
 

En vedette (20)

BDPA Chapter Building Workshop - Week #3
BDPA Chapter Building Workshop - Week #3BDPA Chapter Building Workshop - Week #3
BDPA Chapter Building Workshop - Week #3
 
2014 BDPA High School Computer Competition Meeting (Part 1)
2014 BDPA High School Computer Competition Meeting (Part 1)2014 BDPA High School Computer Competition Meeting (Part 1)
2014 BDPA High School Computer Competition Meeting (Part 1)
 
BDPA Chapter Management Guide
BDPA Chapter Management GuideBDPA Chapter Management Guide
BDPA Chapter Management Guide
 
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
Insights From Data Visualization - Dr. Jeff Camm (University of Cincinnati)
 
Newsletter: BDPA Los Angeles (Mar 2002)
Newsletter: BDPA Los Angeles (Mar 2002)Newsletter: BDPA Los Angeles (Mar 2002)
Newsletter: BDPA Los Angeles (Mar 2002)
 
BDPA Chapter Building Workshop - Week #1
BDPA Chapter Building Workshop - Week #1BDPA Chapter Building Workshop - Week #1
BDPA Chapter Building Workshop - Week #1
 
Networking to Increase Your Net Worth
Networking to Increase Your Net WorthNetworking to Increase Your Net Worth
Networking to Increase Your Net Worth
 
SOP: SITES Funding Requests (Rev: Dec 2016)
SOP: SITES Funding Requests (Rev: Dec 2016)SOP: SITES Funding Requests (Rev: Dec 2016)
SOP: SITES Funding Requests (Rev: Dec 2016)
 
Newsletter: BDPA Cincinnati (Aug 2010)
Newsletter: BDPA Cincinnati (Aug 2010)Newsletter: BDPA Cincinnati (Aug 2010)
Newsletter: BDPA Cincinnati (Aug 2010)
 
BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)
 
IT and the Utilities Industry (Philadelphia, Jan 2013)
IT and the Utilities Industry (Philadelphia, Jan 2013)IT and the Utilities Industry (Philadelphia, Jan 2013)
IT and the Utilities Industry (Philadelphia, Jan 2013)
 
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
Advertisement: 36th Annual BDPA Technology Conference (August 8-9, 2014)
 
Newsletter: BDPA New York (Dec 2010)
Newsletter: BDPA New York (Dec 2010)Newsletter: BDPA New York (Dec 2010)
Newsletter: BDPA New York (Dec 2010)
 
Road to National BDPA HSCC Championship
Road to National BDPA HSCC ChampionshipRoad to National BDPA HSCC Championship
Road to National BDPA HSCC Championship
 
Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1Apostila linux basico_ncd_v1
Apostila linux basico_ncd_v1
 
Apostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parteApostila adm sis_inf_i_prim_parte
Apostila adm sis_inf_i_prim_parte
 
Buscador OCW
Buscador OCWBuscador OCW
Buscador OCW
 
Matematik ders-anlatimi
Matematik ders-anlatimiMatematik ders-anlatimi
Matematik ders-anlatimi
 
Relacionamento
RelacionamentoRelacionamento
Relacionamento
 
Mont taber
Mont taberMont taber
Mont taber
 

Similaire à Federal IT Initiatives - BDPA Conference Executive Panel

Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 
This Project Performs Sentiment Analysis In Various...
This Project Performs Sentiment Analysis In Various...This Project Performs Sentiment Analysis In Various...
This Project Performs Sentiment Analysis In Various...Sarah Gordon
 
Computer Technology And Networking Has Wide Ranges Of...
Computer Technology And Networking Has Wide Ranges Of...Computer Technology And Networking Has Wide Ranges Of...
Computer Technology And Networking Has Wide Ranges Of...Ioulia King
 
Developing A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeAshley Davis
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 

Similaire à Federal IT Initiatives - BDPA Conference Executive Panel (20)

Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
This Project Performs Sentiment Analysis In Various...
This Project Performs Sentiment Analysis In Various...This Project Performs Sentiment Analysis In Various...
This Project Performs Sentiment Analysis In Various...
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
 
Computer Technology And Networking Has Wide Ranges Of...
Computer Technology And Networking Has Wide Ranges Of...Computer Technology And Networking Has Wide Ranges Of...
Computer Technology And Networking Has Wide Ranges Of...
 
Developing A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 

Plus de BDPA Education and Technology Foundation

Plus de BDPA Education and Technology Foundation (20)

Oracle Scholarship for BDPA Students
Oracle Scholarship for BDPA StudentsOracle Scholarship for BDPA Students
Oracle Scholarship for BDPA Students
 
BDPA and College Students
BDPA and College StudentsBDPA and College Students
BDPA and College Students
 
Eli Lilly Scholarship for BDPA Students (2018)
Eli Lilly Scholarship for BDPA Students (2018)Eli Lilly Scholarship for BDPA Students (2018)
Eli Lilly Scholarship for BDPA Students (2018)
 
Johnson & Johnson Scholarship (2018)
Johnson & Johnson Scholarship (2018)Johnson & Johnson Scholarship (2018)
Johnson & Johnson Scholarship (2018)
 
flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair
 
Nomination form * BDPA Cincinnati (2017)
Nomination form * BDPA Cincinnati (2017)Nomination form * BDPA Cincinnati (2017)
Nomination form * BDPA Cincinnati (2017)
 
Newsletter: BDPA Memphis (June 2017)
Newsletter: BDPA Memphis (June 2017) Newsletter: BDPA Memphis (June 2017)
Newsletter: BDPA Memphis (June 2017)
 
Newsletter: BDPA Washington DC (May 2017)
Newsletter: BDPA Washington DC (May 2017) Newsletter: BDPA Washington DC (May 2017)
Newsletter: BDPA Washington DC (May 2017)
 
Oracle Scholarship for BDPA Students
Oracle Scholarship for BDPA StudentsOracle Scholarship for BDPA Students
Oracle Scholarship for BDPA Students
 
Wanda Everett BDPA Scholarship
Wanda Everett BDPA ScholarshipWanda Everett BDPA Scholarship
Wanda Everett BDPA Scholarship
 
BDPA Technology Conference Flyer (2017)
BDPA Technology Conference Flyer (2017)BDPA Technology Conference Flyer (2017)
BDPA Technology Conference Flyer (2017)
 
2017 BDPA Individual PACEsetter Awards Program
2017 BDPA Individual PACEsetter Awards Program2017 BDPA Individual PACEsetter Awards Program
2017 BDPA Individual PACEsetter Awards Program
 
Top Companies for Blacks in Technology `
Top Companies for Blacks in Technology `Top Companies for Blacks in Technology `
Top Companies for Blacks in Technology `
 
flyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fairflyer-BDPAConnect Virtual Career Fair
flyer-BDPAConnect Virtual Career Fair
 
BDPA Cincinnati Computer Camp Orientation (2017)
BDPA Cincinnati Computer Camp Orientation (2017)BDPA Cincinnati Computer Camp Orientation (2017)
BDPA Cincinnati Computer Camp Orientation (2017)
 
BDPA Connect Virtual Career Fair
BDPA Connect Virtual Career FairBDPA Connect Virtual Career Fair
BDPA Connect Virtual Career Fair
 
Overview-SITES_Triangle-2016
Overview-SITES_Triangle-2016Overview-SITES_Triangle-2016
Overview-SITES_Triangle-2016
 
National BDPA Mobile Application Showcase
National BDPA Mobile Application ShowcaseNational BDPA Mobile Application Showcase
National BDPA Mobile Application Showcase
 
ITSMF Educational Scholarship
ITSMF Educational ScholarshipITSMF Educational Scholarship
ITSMF Educational Scholarship
 
2016 Golf Classic Trifold
2016 Golf Classic Trifold2016 Golf Classic Trifold
2016 Golf Classic Trifold
 

Dernier

CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxraviapr7
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 

Dernier (20)

CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic SupportMarch 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 

Federal IT Initiatives - BDPA Conference Executive Panel

  • 1. EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”
  • 2.
  • 3.
  • 4.
  • 5. Federal IT Initiatives: What's Next? Are you ready? Tony McMahon 7/19/2010 BDPA 2010 National Conference Executive Panel Discussions
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Sources Sources: IRS Statistics of Income: http:// www.irs.gov/taxstats/index.html Congressional Budget Office http:// www.cbo.gov / Office of Management & Budget http:// www.whitehouse.gov/omb / HIRE ACT: http://www.irs.gov/newsroom/article/0,,id=220326,00.html
  • 11.
  • 12. BDPA Symposium, Philadelphia Network Centricity 2020 Bob Whitkop Exec Director, NGEN SPO (202)213-7858 Technology in Motion: The changing shapes of the Cloud
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Office of Naval Research (ONR) Funding Opportunity Announcement # 10-023 Deadline September 30, 2011
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. EXECUTIVE PANEL SERIES “ From the Classroom to the Boardroom”

Notes de l'éditeur

  1. Deliver web services – reduce deployment time for new web services by at least 25% Reduce O&M costs/ increase capacity – 15% increase in capacity Transform IT procurement – lower active category managed spend by at least 10% Effectively address risk management – ensure IT is not a barrier to business continuity Complete industry standard web platform – reduce platform cost by at least 30% in first year Simplify governance – increase capacity of internal processes by at least 30% Pilot and launch new end user technologies – at least one meaningful pilot per year Improve end user support – improve resolution time by 10% Complete CADE2 - improve the use of data to drive decision making across the agency Radically rationalize Application portfolio – reduce on-going application maintenance costs by at least 25% Provide standardized services 25% lower TCO for deployed solutions (e.g., storage) Build internal capability – networks, operations, architecture, cybersecurity, planning Utilize cost and performance data transparency throughout IT – have linked, cascading metrics from CTO to first line managers Partner with the business to more effectively plan demand – drive top down coordination across projects and investments to align and team against all initiatives
  2. Build internal capability – networks, operations, architecture, cybersecurity, planning Utilize cost and performance data transparency throughout IT – have linked, cascading metrics from CTO to first line managers Partner with the business to more effectively plan demand – drive top down coordination across projects and investments to align and team against all initiatives
  3. *Dark cloud: Study finds security risks in virtualization By Kathleen Hickey Mar 18, 2010 http://fcw.com/articles/2010/03/18/dark-cloud-security.aspx Government IT upgrade projects may soon have a new wrench thrown into the works. According to recent research from Gartner, 60 percent of virtual servers are less secure than the ones they replace. The situation is slated to continue through the end of 2015, when the number of insecure virtual servers is expected to drop to 30 percent. "Virtualization is not inherently insecure," said Neil MacDonald, Gartner fellow and vice president. "However, most virtualized workloads are being deployed insecurely. The latter is a result of the immaturity of tools and processes and the limited training of staff, resellers and consultants." Numerous state, local and federal agencies have moved or are moving to virtual servers, including the state of California and the Energy Department. While Gartner estimated that only 18 percent of enterprise data center workloads had been virtualized at the end of 2009, that number is expected to grow to more than 50 percent by the close of 2012. One of the major causes of this issue is a lack of involvement of the IT security team in the architecture and planning stages of development, Gartner said. About 40 percent of the surveyed organizations had not brought security professionals into the projects. Related coverage: IBM launches public cloud service Agencies help test cloud-based file storage system Another risk is that the virtualization layer could compromise all hosted workloads, with hackers already targeting this layer, Gartner said. Gartner recommends keeping the layer as “thin as possible, while hardening the configuration to unauthorized changes." Organizations should not rely on host-based security controls, the report states. Other risks include a lack of visibility and controls on internal virtual networks, which are not visible to network-based security protection devices, such as network-based intrusion prevention systems, and consolidations of workloads of different trust levels on the same physical server without adequate separation. There is also the potential for inadequate administrative access controls and administrative tools for the hypervisor/virtual machine manager layer. Finally, a potential loss of separation duties for network and security controls could lead to inadvertently allowing users to gain access to data that exceeds their normal privilege levels. To address these risks, Gartner recommended treating the virtual network as similar to a physical one, with the same kind of monitoring and separation of workloads and the same team handling both. Additionally, organizations should isolate virtual desktop workloads from the rest of the physical data center and restrict access to the virtualization layer.
  4. **Social media opens new door to cyberattacks, panel says Malware is now No. 1 cybersecurity threat, according to survey By David Hubler Mar 24, 2010 http://washingtontechnology.com/articles/2010/03/24/social-media-cyber-attacks.aspx E-mail attachments are no longer the attack of choice of computer hackers and other individuals intent on gaining access to government and industry systems, security experts said today. As increasing numbers of people adopt social media, those sites are becoming the new attack portal of choice and malware is now the No. 1 threat, panelists said at the FOSE 2010 trade show in Washington, D.C. Two or three years ago, the No. 1 vector for viruses was through e-mail, primarily attachments. But today those attacks account for “the low end of single digits,” said Bob Hansmann, senior product marketing manager at Blue Coat Systems. “ The vast majority of attacks actually come through the Web, and yet it is amazing how few people actually scan their http or https, their secure connections to Web mail,” he said. A recent survey found that the number of people who have accounts at social networking sites, such as Facebook and MySpace, is 10 percent greater than the number of people who have e-mail accounts, Hansmann added. “ That’s where all this malware is coming from,” he said. “People have to start looking beyond e-mail and do something at the gateway. You can’t trust the desktop.” The top three IT security issues today are malware, inappropriate employee activity or network use, and issues related to remote Web access, said Andy Lausch, vice president of CDW Government, citing a recent CDW-G survey. “ The potential for incidents grew dramatically over the past year,” Hansmann said. “We saw the number of malware [incidents] double. Phishing attacks went up 600 percent in 2009.” “ We’re just seeing more attacks so we are seeing more incidents,” he said, adding that although Web 2.0 is not a new technology, it has changed the way people use the Internet. “ A lot of users don’t know how to protect themselves,” he said. He called for more education and increased spending for the new kinds of defenses that are needed, such as better URL filtering There’s a cybersecurity tools gap, said Stan Oien, manager of security practices at CDW-G. Government agencies “fully need to figure out where their gaps are,” he said. “Start with an assessment. Try to get an assessment of the environment. That will give you a baseline, and in that way, you can kind of build your plan moving forward.” “ All too often I see a lot of customers and a lot of agencies that actually don’t even know where their gaps are,” Oien added. “Threats are going to be changing. They’re ever-evolving and becoming much more complex.” The panelists suggested that agencies and contractors consider cloud computing as one way to reduce the number of cyberattacks.