The Federal Shared Services Strategy, Potential Staffing and Support Cuts, and More

Here is today’s federal cybersecurity and information technology news round-up:

  • Federal Chief Information Officer Steven VanRoekel released  the Shared Services Strategy on Wednesday along with a guide for a Common Approach to Federal Enterprise Architecture. More here.
  • The Department of Defense and Department of Homeland Security are pressuring Congress to pass cybersecurity legislation, warning of potentially serious cyberattacks in the near term. More here.
  • A survey of  federal chief information officers found that many are considering staffing cuts, reduced contractor support, and reduced levels of service to deal with tight budgets. More here.
  • Defense Secretary Leon Panetta said the DoD is working with the Philippines to expand “joint intelligence, surveillance, and reconnaissance capabilities, and the ability to counter cyber-attacks.” More here.
  • The Office of Management and Budget has put a deadline of December 31 for federal agencies to migration to two information technology shared service initiatives. More here.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.