Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Simon Szykman
The chief information and chief technology offices at the Commerce Department have generated more than $200 million in savings by taking a collaborative approach to purchasing IT and cybersecurity products.
On the Federal Drive show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
Rep. Darrell Issa (R-Calif.) plans to offer the Federal IT Acquisition Reform Act (FITARA) as an amendment later this week to the 2013 Defense Authorization bill. The Senate held a hearing looking at the best approach to empower federal CIOs. The Senate Homeland Security and Governmental Affairs Committee heard that transparency, visibility and senior leadership are common traits among successful CIOs.
Tags: technology , management , Senate Homeland Security and Governmental Affairs , Tom Carper , Tom Coburn , Steve VanRoekel , OMB , Commerce , Frank Baitman , HHS , David Powner , GAO , CIO authorities , PortfolioStat , IT duplication , Commodity IT , Darrell Issa , Federal IT Acquisition Reform Act , House Oversight and Government Reform Committee , Jason Miller
On the one-year anniversary of the Digital Government Strategy, the CIO Council and DHS are expected to issue a security baseline and reference architecture for mobile computing. The goal of the document is not to give agencies new requirements but to focus on those security standards that are mobile-centric.
Tags: technology , TechAmerica , CIO survey , Commerce , Kevin Cox , CIO Council , Brian Teeple , DoD , mobile computing , cybersecurity , George DelPrete , Grant Thornton , Daren Ash , NRC , Jason Miller
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Scott Quehl, the CFO, and Simon Szykman, the CIO, work closely together on ensuring projects remain on track and are efficient as possible. Their relationship is making it easier for Commerce to deal with budget and oversight pressures.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
The Shared Services Strategy is the latest way agencies can reduce spending on infrastructure technology and spend more on mission-critical IT. Federal CIO Steven VanRoekel said PortfolioStat is the lynchpin to the entire process for agencies. He held the first meeting with agencies leaders to discuss expectations.
Shared services can mean anything from infrastructure consolidation to expanding operations services across a department or between agencies, sid Commerce Department's Chief Information Officer Simon Szykman in an interview with The Federal Drive with Tom Temin and Emily Kopp.
Remember the idea of a stipend to help pay for the technology you REALLY want?