Author: govacq

Splunk GovSummit 2015

Join Government IT, Security, Program and Management professionals October 22, 2015 at the Marriott Marquis in Washington, DC to discuss how government is using data today to make a big difference in the future. Whether your agency has future sights on improving its security posture, maximizing value of services delivered or driving efficiencies, GovSummit sessions and discussions will provide you with insights on how to optimize your data to enhance mission delivery and pave the way for the future. Register Here

Events

July 2015 GovLoop Guide Interview with our CTO, Prem Jadhwani, on “How Data Analytics Drives Mission Outcomes”

Most of us don’t think twice before powering up navigation apps, weather apps and other nifty resources on our mobile devices. Apps such as Zillow and Trulia put housing market data at our fingertips, and the travel search engine KAYAK has made shopping for flights, hotels and rental cars that much easier.

Besides the ease of use that these apps provide, they share another common denominator: Each is powered by government data.

For far too long, the government’s data assets have been locked away in siloed systems, in less-than-ideal formats and with little incentive for agencies to share data across bureaus or with the public.

But that’s changing. The open data movement is driving government to make its data more accessible to the public in formats that people can use. As a result, entrepreneurs and everyday citizens are developing applications that benefit both the public and government.

Agencies are realizing that open data leads to better citizen engagement, increased transparency around government operations and better decision-making. Open data is empowering government officials and citizens to make informed decisions about health care, sustainability and transportation issues. Making data open and accessible to the public enables the government to tap into the knowledge and expertise that exists far beyond its walls. The benefits are endless.

Clearly, it’s more important than ever to understand how to implement and benefit from open data at your organization. That’s why GovLoop has created our latest guide, “The Open Data Playbook for Government.”

In this playbook, we offer helpful tips to solve some of your most pressing open data challenges, including measuring return on investment, boosting public engagement and much more. This playbook will help you:

  •  Identify key tenets of an open data program.
  • Show the impact of your program.
  • Explain the benefits of open data.
  • Increase public engagement with your data.
  • Make data more accessible and easy to use.
  • Identify key roles and responsibilities for your data team.
  • Develop partnerships with the private sector.

In this playbook you’ll also find practical examples and lessons learned from government Chief Data Officers (CDOs) and open data enthusiasts who are embracing open data to improve transparency and make better decisions.

 

News

March 2015 GovLoop Guide Interview with our CTO, Prem Jadhwani, on “Crafting Holistic Insider Threat Protection”

Many news outlets declared 2014 to be “The Year of the Breach,” especially for government. The title seems appropriate. Last year, the U.S. Postal Service (USPS), the Nuclear Regulatory Commission, the State Department, and even the White House fell victim to successful hacks that resulted in sensitive information being exposed to adversaries and the public.

And that’s just the beginning. Nearly every state experienced a government network breach during 2014, while simultaneously managing disruptions in commerce caused by hacks of companies such as Home Depot, Staples, and Target. Even localities were not exempt — Rapid City, N.D., and Napa, Calif., are just two cities whose websites were hacked.

Nevertheless, maybe we should reconsider that title and be a little more optimistic. Instead of “Year of the Breach,” can we consider 2014 to be the “Year of Lessons”? Maybe the “Year of Progress”? While government-at-large certainly faced setbacks in the cyber world, many agencies also took great steps toward security. At the federal level, commitments were made and plans drawn to better equip smaller entities with the resources and strategies necessary to protect their networks. Locally, many organizations created new partnerships and streamlined their internal systems to achieve greater security at less cost.

This guide explores how local, state, and federal governments have learned from successful attacks of the past to bolster their cybersecurity today. In this guide, we:

  • Describe the level and impact of advanced cyberattacks on government agencies.
  • Discuss five cybersecurity tactics that the public sector has deployed to mitigate risk.
  • Provide two case studies from government to illustrate each tactic in action.
  • Detail lessons learned from these government tactics.

The numerous cyber incidents of last year prove there is still more government must do to secure our nation’s networks. However, the case studies in this guide highlight that innovators in the public sector are already leading the way to enhanced cybersecurity.

Download the guide here.

News

2015 Symantec Government Symposium

Come see Government Acquisitions’ Chief Technology Officer, Prem Jadhwani, be a part of a panel discussion on “Risky Business: Minimizing Insider Threat” at the 2015 Symantec Government Symposium.

When: April 15, 2015 at 10:00AM.

Where: Walter E. Washington Convention Center

Washington, D.C.

About the Event

We are pleased to announce that the 2015 Symantec Government Symposium, “Secure Government: Manage, Mitigate, Mobilize,” will take place on April 15, 2015 at the Walter E. Washington Convention Center in Washington, D.C.

Serious challenges call for serious dialogue. Join the leading government IT security and management professionals, keynote speaker Robert Mueller (former director of the FBI), and Government Acquisitions at this one-day event to discuss best practices in:

  • The New IT: Learn how to ensure secure information access and hear real-world case studies in secure application management
  • Data Optimization: Learn about data governance and information sharing in the age of big data
  • Legislation and Policy: Get the read on cyber legislative priorities and policy driving implementations
  • Cyber Front Lines: Discuss security intelligence, cyber crime scenarios, and advanced persistent threats
  • Securing Government: Focus on insider threats, CDM, and risk management

Click here to register.

Events, News

SOFIC 2015

Come see Government Acquisitions at the upcoming SOFIC 2015  

(Special Operations Forces Industry Conference) on May 19 – 21, 2015!

Booth # 2128

“Winning in a Complex World”  

2015 SOFIC (Special Operations Forces Industry Conference) will be held May 19–21, 2015 at the Tampa Convention Center, Tampa, FL. This year’s conference theme, “Winning in a Complex World,” will provide a forum for military, government, academia, and industry stakeholders to network and discuss current and future challenges and how to best support our Special Operations Forces (SOF) around the globe.

Additional information can be found on the SOFIC website

Events

2015 Department of Energy Cybersecurity Training Conference

Come see Government Acquisitions at the upcoming 2015 Department of Energy

Cybersecurity Training Conference on April 21 – 22, 2015!

Enabling Agents of Change: Securing DOE through Collaboration

Celebrating 32 years of cyber collaboration in exploring and implementing new cyber technologies required to securely accomplish the DOE mission.

The Department of Energy Chief Information Officer (CIO) and the Associate CIO for Cybersecurity welcome you to participate in their 2015 Department of Energy 32nd Cybersecurity Training Conference.

As an important part of the outreach of the Office of Cybersecurity to the Department’s field and program elements, the conference provides opportunities for information exchange among Federal and contractor staff and covers technical and management issues, policy, and awareness related to the protection of the Department’s computers, networks, data, and implementation of information technology. The conference includes well-known speakers in the cybersecurity field and multi-tracked technical and management briefings on current research and practices that are useful to the attendees. The agenda structure also allows for working group meetings and workshops. Conference plenary and track sessions provide networking and in-depth opportunities in cybersecurity technical disciplines as well as implementation of Federal and Departmental policy and guidance. While technology is a key element of the conference, the focus is on collaboration in providing meaningful information as Enabling Agents of Change in Securing DOE through Collaboration to maximize value of IT for the agency.

April 21-22, 2015
Sheraton Kansas City Hotel at Crown Center
Kansas City, MO

Additional information can be found on the event website

Events
en_USEnglish