Sat.Jan 21, 2023 - Fri.Jan 27, 2023

article thumbnail

The strange case of a stage for Pope Francis

Telles.eu

Over the last few days, Portuguese media have been enthralled about a procurement case involving a stage for Pope Francis upcoming visit in August 2023. The country is hosting the World Youth Day with the main event being held at a space between the municipality of Lisbon and Loures. The crux of procurement matter is the *temporary* main stage which will be costing a cool €5.4M to build and be used for a couple of days.

article thumbnail

Three Key Lessons from a True Procurement Ironman

Art of Procurement

In this week’s podcast, Philip Ideson interviews Vytas Sliesoraitis, a procurement leader turned Ironman competitor. Click here to listen. Vytas. The post Three Key Lessons from a True Procurement Ironman appeared first on Art of Procurement.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Federal Agencies Can Leverage the Cloud for Application Modernization

FedTech Magazine

While federal agencies face hurdles to digital transformation and using technology to improve processes and the citizen experience, they are making steady progress. Modernizing legacy, monolithic applications that have resided on on-premises hardware and adapting them to more modern, cloud-based environments is an ongoing project across government. Modernized apps run faster and more efficiently and are also less costly to operate.

article thumbnail

Gov Turns to Creative Solutions for Cyber Staffing Shortages 

GovLoop

“If you can’t hire enough experienced security professionals, why not outsource routine, repetitive tasks? Or activities that require special skills? Or jobs that someone else has figured out how to automate?” – 2022 Cyberthreat Defense Report An agency’s limited budget or staff shortages doesn’t negate their need for strong cybersecurity. But how can your IT staff take the precautions they need to secure your data while facing those budgetary and staffing challenges?

article thumbnail

How to Create a Blueprint for Fleet Resilience

Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader

Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,

article thumbnail

5 things to consider when creating a vendor diversity program

Bonfire

So you want to create a vendor diversity program. Where do you start? What pieces should you have in place for success? The most common thing preventing procurement teams from creating these initiatives is not having a starting point. Recently, we had the pleasure of sitting down with DeNita Lacking-Quinn (Supervisor at City of Dallas Procurement Services) and André McEwing (Supplier Diversity Manager at Tarrant County College) during our TexasTalk event to get their tips on creating an effectiv

Bidding 52
article thumbnail

[Pod] Establishing Procurement in a Moonshot Factory w/ Vytas Sliesoraitis

Art of Procurement

“Hire the people. Build the processes. Learn about the product lifecycle. Start to get early wins with different products and. The post [Pod] Establishing Procurement in a Moonshot Factory w/ Vytas Sliesoraitis appeared first on Art of Procurement.

More Trending

article thumbnail

Orlando’s Approach to Managing Change and Culture

GovLoop

Zero trust is a new buzzword, but not a new concept. Depending on what you read, a Forrester researcher coined the term in 2010 or it first came about at the Jericho Forum security consortium a few years before that. Either way, it’s crucial today, although the model isn’t always easy to implement. “Lately, the changing threat landscape is making this model more critical to safeguard digital assets,” said Rosa Akhtarkhavari, former CIO for Orlando, Florida, who was appointed Deputy Chief Financi

article thumbnail

How to Break into Government Contracting [Part 7]: Compete to Win

Key Solutions

Like an Olympic athlete who must train, practice, and then qualify to compete, succeeding in the federal market also requires long-term preparation and planning.

article thumbnail

[Pod] Procurement 6 – January 27th, 2023

Art of Procurement

Procurement 6 is a new short podcast from Art of Procurement that will be published in the Art of Procurement. The post [Pod] Procurement 6 – January 27th, 2023 appeared first on Art of Procurement.

article thumbnail

VA Contractors Have Broad New Cybersecurity Obligations

WIFCON: Government Contracts

Eric S.

40
article thumbnail

How AI Opens up Other Types of Data

GovLoop

Imagine you have a massive cache of digital family photos, and you’re looking for images of your child’s kindergarten graduation. Sure, it’s great having all those photos on the computer, but unless you tagged them in some way, there’s no quick way to find what you need. This dilemma mirrors how valuable information can be so difficult to find when it comes in the form of “unstructured data.

Data 59
article thumbnail

Inside the IRS’s Digital Microlearning Program

GovLoop

The Internal Revenue Service handles all federal taxes, so training employees about such a huge responsibility can seem intimidating. But, since 2013, the Self-Help Online Tutorials (SHOTs) program has been the IRS’s secret weapon. SHOTs utilize microlearning — or short, simple educational videos — to inform IRS workers about topics such as safety leave.

article thumbnail

Why Stronger Security Hinges on Identity Data

GovLoop

At the crux of every cybersecurity strategy is an identity data management challenge: How much information does an agency need to verify the identity of an individual requesting access to network resources? As it turns out, a lot. The problem is that edge computing — in which data is being aggregated, accessed or processed outside the network perimeter — is leaving data exposed to cyber criminals who see an opportunity to make money through ransomware schemes.

Data 59
article thumbnail

14 Ways to Get Organized

GovLoop

Even the most organized people occasionally slip into disorder. Perhaps they neglect to file something or tidy their email inbox, or maybe they allow a stack of papers to grow haphazardly on the corner of their desk. For those of us who struggle with personal organization — whether it’s been a lifetime challenge or something more recent — developing an organizational plan can seem overwhelming.

article thumbnail

Imposter Syndrome: Overcoming the “Fake It ’Til You Make It” Mantra

GovLoop

Maybe you started a new job or just got a promotion, and you’re questioning if you’re qualified. Or maybe you got an assignment you feel woefully inadequate to complete. Where does this unwarranted sense of insecurity come from? Those feelings of fraudulence have a name and need to be called out. Nearly 70% of the U.S. population experiences imposter syndrome, and that energy can either fuel or cripple you.

IT 52
article thumbnail

The Hard Truth Behind Ransomware

GovLoop

Ransomware and cyberattacks have become more sophisticated, more costly and increasingly damaging. “Ransomware is a serious threat to our public safety and national and economic security,” said Richard W. Downing, Deputy Assistant Attorney General, Criminal Division, U.S. Department of Justice in a recent interview. “It has been used to attack municipal governments, police departments and critical infrastructure.

article thumbnail

CISA: Create Guardrails for Federal Innovators

GovLoop

Innovation and cybersecurity often seem at odds. That is, until there’s a shared understanding of what problems employees are trying to solve and how security can enable a strong solution. If IT is being done outside the role of the chief information officer (CIO) it means that those who rely on the IT department are not getting the service they need, or maybe it’s too costly or perhaps as a mission owner or operator they don’t feel heard, said Robert Costello, CIO at the Cybersecurity & Inf

article thumbnail

What Story Is Your Data Telling?

GovLoop

Let’s say defense analysts are trying to connect the dots around terrorist activity. Using various data points such as bank account numbers, location coordinates, equipment types and names, analysts can derive a cohesive “story” from the data that aids the mission. To do this, traditionally, analysts combed through data from various sources — spreadsheets, databases, cloud storage, etc. — to manually input into an Excel file and then make connections between the fields.

Data 52
article thumbnail

View the Full Agenda for Digital Outcomes 2023

Art of Procurement

Our agenda includes: ? February 15th, 2023 | Day 1 10:00a – 10:35a EST – Session 1 | Prioritizing the. The post View the Full Agenda for Digital Outcomes 2023 appeared first on Art of Procurement.

article thumbnail

Budgeting Is a Collaborative Effort

GovLoop

Local government services play a role in so much of our everyday lives that they become invisible. How often do you think about the water you fill your coffeemaker with each morning, the street you drive your children to public school on or what happens after you drag the trash bin to the curb? They’re all services that hum along — until something goes wrong and residents get loud.

Budget 52
article thumbnail

Digital Outcomes Session Spotlight: Top Performance Concerns for Forward Looking Executives

Art of Procurement

Digital Outcomes Session Spotlight: Top Performance Concerns for Forward Looking Executives | February 16th, 10:40 – 11:10 AM ET Click. The post Digital Outcomes Session Spotlight: Top Performance Concerns for Forward Looking Executives appeared first on Art of Procurement.