Building effective virtual government requires new ideas, innovative thinking and hard work. From cybersecurity to cloud computing to mobile devices, Dan discusses what’s hot and what works.
Unexpected situations can bring unforeseen questions, especially when tensions and stakes are high. But a little preparation goes a long way. Here are three tips for navigating difficult questions, no matter their source.
Security chiefs spend a lot of time thinking about how to fend off attacks that come from outside their own systems, but threats from inside organizations can be just as devastating if the right measures aren’t in place.
As a new decade dawns and new tech emerges how will you keep up with the changes? Here are three ways to continue growing as a cybersecurity leader and keeping your agency safe in an uncharted future.
New technologies will only continue making their way into government IT shops, and CISOs cannot always be the ones to say “no.” A smart management approach will ensure smooth adoption with cybermeasures in place.
The security challenges governments face continue to evolve. And while the stakes are higher than ever before, the responsibilities of public- and private-sector chief information security officers remains the same.
A chief information security officer’s success rides on how they address a few crucial issues, like when to stop an IT project in the name of cybersecurity and whether the staff they hire is accountable and trustworthy.
The beginning of a new security chief's tenure is critical. From opening lines of communication to creating a strategic plan, here are seven dos — and three don’ts — for successfully navigating a new position.
Best practices for cyberleaders anticipating administration changes this November.
There's no one path to a career at the top of the heap.
As cities grow smarter and more connected, what implications does that have for cybersecurity?
Well-planned cybersecurity roadshows can help get agencies on board and up to speed.
Getting and keeping top cybersecurity staff in government isn't always easy, but there are strategies available to build your workforce.
As scammers target legacy tech, government agencies must get savvy.
Is your metrics program coordinated with decision-making?
Serverless computing allows a true platform-as-a-service environment, letting developers focus on coding rather than back-end operations.
Data can help governments solve specific problems and prepare for major events.
Many people and organizations think cybersecurity insurance can improve the cyberdefense status quo for the public and private sectors. But is that really the case?
First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.
Renewed emphasis is being placed on vulnerabilities associated with voting machines.
If you want to increase innovation, many experts suggest slowing down first.
Why breach prevention and response strategies are both essential.
Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.
You can’t secure the entire cloud, but you can take steps to secure your data.
You want the masses behind your security efforts and helping the team identify the bad apples, but not stifling innovators who make a positive difference.
The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.
How things like the NSA, 9/11 and Y2K have influenced where security is headed.
The Metcalf incident is a wake-up call for better critical infrastructure protection.
Bracing ourselves for the onslaught of Internet-connected devices.
Does your government need a 24/7 security operations center?
Ransomware is a scary evolution of online fraud — and you must prepare to deal with it.
Small security breaches occur in government more often than many people are aware of.
New devices mean new policies for governments to enact.
Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.
3 tips for getting the go-ahead on security projects.
Government agencies can maintain security but still avoid being no-fun zones.
The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.
Comparing public- and private-sector IT services is essential for effective leadership.
Many challenges remain to establishing digital identities, but state and local governments must act quickly.
Learning about an organization from the inside out.
Michigan chief technology officer learns about an organization from the inside out.
Government IT professionals need an all-encompassing, prioritized perspective to successfully address complex system issues.
The more you specify unique security requirements, the harder it becomes to obtain the benefits of cloud computing.
Emergency management's scenario-based planning is for budgets too.
South Africa's preparation for the 2010 World Cup provides valuable lessons for IT leaders.
Michigan shares digital infrastructure with Oakland County for cheaper, faster connections.
Opportunities, challenges and recommendations for virtualizing IT in the public sector.
IT project management strategies for state and local governments.
Dan Lohrmann gives six tips on handling a new information technology job in government.
Contractors must make security a priority.
Michigan CISO Dan Lohrmann discusses security challenges.
Utility computing can consolidate IT departments, but raises security questions.
Good e-government starts with good identity management.
Build technology recovery into broader emergency response efforts.
The road to better information security, ironically, passes through better information sharing.