This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
While federal agencies face hurdles to digital transformation and using technology to improve processes and the citizen experience, they are making steady progress. Modernizing legacy, monolithic applications that have resided on on-premises hardware and adapting them to more modern, cloud-based environments is an ongoing project across government. Modernized apps run faster and more efficiently and are also less costly to operate.
In this week’s podcast, Philip Ideson interviews Vytas Sliesoraitis, a procurement leader turned Ironman competitor. Click here to listen. Vytas. The post Three Key Lessons from a True Procurement Ironman appeared first on Art of Procurement.
“If you can’t hire enough experienced security professionals, why not outsource routine, repetitive tasks? Or activities that require special skills? Or jobs that someone else has figured out how to automate?” – 2022 Cyberthreat Defense Report An agency’s limited budget or staff shortages doesn’t negate their need for strong cybersecurity. But how can your IT staff take the precautions they need to secure your data while facing those budgetary and staffing challenges?
Like an Olympic athlete who must train, practice, and then qualify to compete, succeeding in the federal market also requires long-term preparation and planning.
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
There are likely hundreds of individual networks across the federal government, reflecting the number and breadth of agencies. Most highly federated agencies alone have multiple networks. In recent years, there has been a push among agencies to consolidate networks. The Defense Information Systems Agency has been working to consolidate the networks of the Pentagon’s non-warfighting support agencies, collectively known as the “fourth estate.
“Hire the people. Build the processes. Learn about the product lifecycle. Start to get early wins with different products and. The post [Pod] Establishing Procurement in a Moonshot Factory w/ Vytas Sliesoraitis appeared first on Art of Procurement.
Zero trust is a new buzzword, but not a new concept. Depending on what you read, a Forrester researcher coined the term in 2010 or it first came about at the Jericho Forum security consortium a few years before that. Either way, it’s crucial today, although the model isn’t always easy to implement. “Lately, the changing threat landscape is making this model more critical to safeguard digital assets,” said Rosa Akhtarkhavari, former CIO for Orlando, Florida, who was appointed Deputy Chief Financi
Zero trust is a new buzzword, but not a new concept. Depending on what you read, a Forrester researcher coined the term in 2010 or it first came about at the Jericho Forum security consortium a few years before that. Either way, it’s crucial today, although the model isn’t always easy to implement. “Lately, the changing threat landscape is making this model more critical to safeguard digital assets,” said Rosa Akhtarkhavari, former CIO for Orlando, Florida, who was appointed Deputy Chief Financi
So you want to create a vendor diversity program. Where do you start? What pieces should you have in place for success? The most common thing preventing procurement teams from creating these initiatives is not having a starting point. Recently, we had the pleasure of sitting down with DeNita Lacking-Quinn (Supervisor at City of Dallas Procurement Services) and André McEwing (Supplier Diversity Manager at Tarrant County College) during our TexasTalk event to get their tips on creating an effectiv
Procurement 6 is a new short podcast from Art of Procurement that will be published in the Art of Procurement. The post [Pod] Procurement 6 – January 27th, 2023 appeared first on Art of Procurement.
Imagine you have a massive cache of digital family photos, and you’re looking for images of your child’s kindergarten graduation. Sure, it’s great having all those photos on the computer, but unless you tagged them in some way, there’s no quick way to find what you need. This dilemma mirrors how valuable information can be so difficult to find when it comes in the form of “unstructured data.
Over the last few days, Portuguese media have been enthralled about a procurement case involving a stage for Pope Francis upcoming visit in August 2023. The country is hosting the World Youth Day with the main event being held at a space between the municipality of Lisbon and Loures. The crux of procurement matter is the *temporary* main stage which will be costing a cool €5.4M to build and be used for a couple of days.
The Internal Revenue Service handles all federal taxes, so training employees about such a huge responsibility can seem intimidating. But, since 2013, the Self-Help Online Tutorials (SHOTs) program has been the IRS’s secret weapon. SHOTs utilize microlearning — or short, simple educational videos — to inform IRS workers about topics such as safety leave.
At the crux of every cybersecurity strategy is an identity data management challenge: How much information does an agency need to verify the identity of an individual requesting access to network resources? As it turns out, a lot. The problem is that edge computing — in which data is being aggregated, accessed or processed outside the network perimeter — is leaving data exposed to cyber criminals who see an opportunity to make money through ransomware schemes.
Even the most organized people occasionally slip into disorder. Perhaps they neglect to file something or tidy their email inbox, or maybe they allow a stack of papers to grow haphazardly on the corner of their desk. For those of us who struggle with personal organization — whether it’s been a lifetime challenge or something more recent — developing an organizational plan can seem overwhelming.
Maybe you started a new job or just got a promotion, and you’re questioning if you’re qualified. Or maybe you got an assignment you feel woefully inadequate to complete. Where does this unwarranted sense of insecurity come from? Those feelings of fraudulence have a name and need to be called out. Nearly 70% of the U.S. population experiences imposter syndrome, and that energy can either fuel or cripple you.
Ransomware and cyberattacks have become more sophisticated, more costly and increasingly damaging. “Ransomware is a serious threat to our public safety and national and economic security,” said Richard W. Downing, Deputy Assistant Attorney General, Criminal Division, U.S. Department of Justice in a recent interview. “It has been used to attack municipal governments, police departments and critical infrastructure.
Innovation and cybersecurity often seem at odds. That is, until there’s a shared understanding of what problems employees are trying to solve and how security can enable a strong solution. If IT is being done outside the role of the chief information officer (CIO) it means that those who rely on the IT department are not getting the service they need, or maybe it’s too costly or perhaps as a mission owner or operator they don’t feel heard, said Robert Costello, CIO at the Cybersecurity & Inf
Let’s say defense analysts are trying to connect the dots around terrorist activity. Using various data points such as bank account numbers, location coordinates, equipment types and names, analysts can derive a cohesive “story” from the data that aids the mission. To do this, traditionally, analysts combed through data from various sources — spreadsheets, databases, cloud storage, etc. — to manually input into an Excel file and then make connections between the fields.
Our agenda includes: ? February 15th, 2023 | Day 1 10:00a – 10:35a EST – Session 1 | Prioritizing the. The post View the Full Agenda for Digital Outcomes 2023 appeared first on Art of Procurement.
Local government services play a role in so much of our everyday lives that they become invisible. How often do you think about the water you fill your coffeemaker with each morning, the street you drive your children to public school on or what happens after you drag the trash bin to the curb? They’re all services that hum along — until something goes wrong and residents get loud.
Digital Outcomes Session Spotlight: Top Performance Concerns for Forward Looking Executives | February 16th, 10:40 – 11:10 AM ET Click. The post Digital Outcomes Session Spotlight: Top Performance Concerns for Forward Looking Executives appeared first on Art of Procurement.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content