Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
CIOs expected to know more under new core competencies
Friday - 1/18/2013, 4:10pm EST
Federal chief information officers need to know just a little bit more to be successful.
The CIO Council added nine new Clinger-Cohen Act core competencies, such as IT program-management leadership, vendor management and social media.
The council's IT Workforce Committee Thursday released the updated list of competencies and learning objectives.
"The 2012 Clinger-Cohen Core Competencies and their associated learning objectives will be used as the foundation for IT course and curriculum development, as well as the development and consistent implementation of IT workforce policy initiatives across the federal government," the document stated. "Periodically, the federal government reviews this core body of competencies in order to ensure critical knowledge areas impacting information resources management are captured. Changes in this updated version reflect new statutory and regulatory requirements, as well as areas requiring greater emphasis due to new policies and strategies (e.g., the recently released presidential strategy on Digital Government), continuous changes in technology, and other evolving agency IT/cybersecurity mission requirements."
The CIO Council first published a list of competencies in 1997, one year after the Clinger-Cohen Act became law.
For the first time, the CIO Council also mapped the competencies to the new Office of Personnel Management's executive core qualifications (ECQ), where applicable.
"Attainment of these qualifications is required for entry to the Senior Executive Service," the document stated. "The mapping is provided to support multi-purpose leadership development for IT management and executive positions."
Among the newly added skills, CIOs must be able to discuss the pros and cons of letting employees freely use social media, describe how Web 2.0 is changing collaboration and the detail that goes into a social media policy.
Around vendor management, the skills now include developing service-level agreements, creating vendor-management policies and discussing how best to manage contractors.
The 71-page document also details the skills around everything from knowing how acquisition works, both in the pre-award and post-award stages, to evaluating supply-chain risk management to cybersecurity roles, responsibilities, legislation, policy and reporting requirements.