bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:04 am, July 12, 2014

Search Result

Search Tags:  Business intelligence

How to understand big data

Keith Boyer, the chief operating officer for DMG Federal will discuss how his company can help your agency with data management.
March 4, 2014

Tags: technology , big data , data management , Keith Boyer , DMG Federal , Chrystal Reports , Oracle , Tableau Software , Birst , Kognito , IBM , Microsoft , data visualization , John Gilroy , Federal Tech Talk

Tuesday - 03/04/2014, 10:24pm EST
Listen

Business intelligence & predictive analytics

Charles Caldwell, director of Solutions Engineering at LogiAnalytics, will discuss how his company can help your agency with data management.
January 7, 2014

Tags: technology , data management , big data , predictive analytics , Charles Caldwell , LogiAnalytics , Microsoft , IBM , SAS , Oracle , John Gilroy , Federal Tech Talk

Tuesday - 01/07/2014, 07:23pm EST
Listen

Army Contracting Command easing burden on contracting officers

Gino Magnifico, the ACC's chief information officer, said his component is helping to lead an Armywide effort to develop a new contract writing system. It's not just a technology refresh, however. It's about improving the business processes.
September 6, 2012

Tags: technology , acquisition , Gino Magnifico , Army , Army Contracting Command , data analytics , Ask the CIO , Jason Miller

Thursday - 09/06/2012, 08:32pm EDT
Listen

The current state of business intelligence

Guident Executive Vice President Dan Ackerman and Senior Vice President Ken Raffel join host John Gilroy to talk about how business intelligence is changing.
January 24, 2012

Tags: technology , Dan Ackerman , Guident , efficiencies , data effectiveness , predictive analysis , data management , content intelligence , mobile technology , federal budget , budget cuts , cost cutting , John Gilroy , Federal Tech Talk

Tuesday - 01/24/2012, 08:21pm EST
Listen

Defining Federal Cyber Risk Management

People exercise risk management, consciously and unconsciously, every day.

Many of us drive on a daily basis. Some speed, and risk the chance of getting caught, while others are more conservative and drive the exact speed limit. We base our decision on whether or not to exceed the speed limit on the information available to us at the time, including our knowledge, past experiences, or the conditions we see in front of us. We weigh the risks against impacts and consequences, making decisions based upon our tolerance for the outcomes. The same is true for federal cyber risk management.

Securing federal information and assets in cyberspace is the primary driver behind cybersecurity. Even so, other factors help define risk, including the potential for negative publicity if a cyber breach occurs, the impact to budget/performance plans if FISMA grades fall short, or the potential for investigations or congressional hearings if the burning issue of the day burns a bit too bright for too long. Federal cyber risk management fundamentally boils down to making risk decisions based upon an agency's risk tolerance - and the drivers behind an agency's tolerance vary across the federal government.

Risk is defined as the likelihood of a future event that may have unintended or unexpected consequences. Federal agencies make the best cyber risk management decisions by using data and information to evaluate the agency's strengths and weaknesses for delivering on its cyber mission in the context of potential threats.

Agencies must use information and data from various disparate sources across the enterprise to make these decisions, including audit log information, vulnerability data, asset information, the agency's regulatory compliance status, external and internal threat activity, human capital risks to the cybersecurity mission, and many more. As challenging as it may be for agencies to consume large volumes of disparate data, it is a challenge that is essential to overcome for agencies to make the best cyber risk management decisions.

Is this achievable? Absolutely. The business intelligence movement established the foundation allowing agencies to minimize risk exacerbated by ad-hoc decision-making. Leveraging business intelligence capabilities for cybersecurity enables agencies to aggregate data across technical and organizational stovepipes and to provide agency cybersecurity leaders with mechanisms for making informed, risk decisions. By better understanding the cyber landscape, federal cybersecurity leaders can - much like our speeding driver example - understand "how fast" to drive and make better investment decisions when addressing enterprise cybersecurity risks.

Tags: technology , KCG's Trusted Advisor Center , cyber , cybersecurity , FISMA , cyberspace , business

Thursday - 09/16/2010, 12:19pm EDT

Managing and Mobilizing Information

Bob Laurence
VP and General Manager
Sybase
July 14, 2009
(Reairs August 18th, 2009)

Tags: technology , contracting , analytics , data warehouse , mobile device management , Sybase IQ , Powerbuilder , m-Business Server , Replication server

Tuesday - 08/18/2009, 01:28pm EDT