DOD Cybersecurity Modernization Efforts Going Full Force

Lloyd McCoy Jr.by Lloyd McCoy Jr., Consultant

This monthSpeedomoter promises to go down in the books as one of the busiest months of cybersecurity developments for the Department of Defense. For one, the military will soon publish a new cyber strategy, guiding DOD on how to best secure its networks and build out new capabilities. Along the same lines, the Navy plans to release its own strategy in the very near future.

Earlier this month, we saw the Air Force formally launch its Task Force Cyber Aware program, echoing a similar initiative out of the Navy. The Air Force’s Cyber Aware program aims at helping the department develop a risk management strategy centered on security. Just this week we saw the Army hosting a workshop in an effort to hire and retain top cybersecurity professionals. To add to everything else, as I discussed last month, cybersecurity has been top of mind on the Hill. As a COTs vendor, it’s important to understand where all this cyber commotion is coming from and what types of future cyber investments DOD is looking to make.

Read more of this post

3 Must-Knows on Navigating SLED IT Waters

Rachel Eckertby Rachel Eckert, Senior Analyst

During March’s 3 Must-Knows on Navigating SLED IT Waters Beyond the Beltway event, a panel of CIOs shared countless insights on current and upcoming opportunities in the state, local, and education (SLED) market, but the most interesting takeaway was a short one-liner from Oregon’s Chief Information Officer, Alex Pettit,  “hundreds of people can say ‘no’ in an organization, but only a small number can say yes.” This got me thinking, knowing who has the decision-making powers is just as important as what is being decided.

As technology vendors, once we discover who’s who, our jobs suddenly become a lot easier.  We often use publically available resources to find information on our customer’s priorities and budgets, but discovering who the decision-makers are in SLED and what impacts their decisions is the most important step to thriving in this market.

So, how do IT vendors navigate the confusing waters of SLED IT? Here are three must-knows before you embark on your SLED journey:

Read more of this post

NIST’s Immediate Need for an Enterprise Backup Software Solution

Chris Wiedemann_65 x 85by Chris Wiedemann, Senior Analyst

COTS vendors Row of network servers in data centerthat sell continuity of operations (COOP), disaster recovery, or enterprise backup software should get in touch with the National Institute of Standards and Technology (NIST) in the next few days. NIST’s Infrastructure Service Division at the National Center for Neuron Research is responsible for storing and sharing large quantities of mission-critical data, and they have a pressing need for enterprise-level backup capabilities. They’re looking to replace their current backup software with a new solution that will allow them to back up a virtualization platform, physical servers, and desktops, as well as network-attached appliances (in other words, the whole nine yards).

Read more of this post

DOD’s COCOMs: Unique Opportunities and Requirements

Stephanie Meloni_65x85by Stephanie Meloni, Senior Analyst

Among theDOD’s COCOMs: Unique Opportunities and Requirements public sector IT industry there’s a common misconception that the Combatant Commands (COCOMs) have no information technology budget, they operate purely at the discretion of the Service Branches, and offer little in the way of procurement opportunities for COTS vendors. To be fair, the COCOMs have complex and dissimilar budget structures that muddle the buckets of money spent on IT, making it difficult to determine how and where money is being allocated. Misperceptions are understandable.

Some may be surprised to learn IT funding for the COCOMs does not always originate from the Services. For example, Functional commands like U.S. Transportation Command (TRANSCOM) and U.S. Special Operations Command (SOCOM) get IT budgets appropriated from Congress. TRANSCOM’s IT budget request for FY16 is $444M and SOCOM’s is $287M. Also, the COCOMs have some autonomy for purchasing technologies and offer potent procurement opportunities IT vendors shouldn’t ignore.

Read more of this post

3 FAA Programs Seeing Growth in DME Funding: Part II

Kevin Shaker_65 x 85by Kevin Shaker, Analyst, Market Intelligence

In DME Explosion at FAA7 FAA Programs Seeing Growth in DME Funding: Part 1 I gave a quick rundown on which Federal Aviation Administration (FAA) programs had requested larger amounts of development, modernization, and enhancement (DME) funding for their FY16 IT budget. Today I’ll touch on the largest technology priorities within the FAA and their related programs.

APPLICATIONS

FAA’s program with the largest DME increase, DataComm – the organization’s attempt to automate enhancements for air control communication and data linkage between aircraft and ground users – has modeling & simulation requirements that’ll need to be met before its implementation in FY16-17. You’ll want to show how your product can aid in their testing efforts and efficiently meet their rollout deadline. If your company has collaboration solutions, you’ll also want to reach out to DataComm decision makers to indicate how your product can help automate data transfer from aircraft to ground users.

Read more of this post

Big Data Opportunities in the Pipeline at DHS & DOJ

Tomas OKeefe_65x85Tomas O’Keefe, Consultant, Market Intelligence

At last Big data on blackboardweek’s AFCEA Homeland Security conference, information sharing and cybersecurity were some hot topics that seemed to take center stage. These are critical elements of the homeland security enterprise, tied to protecting information and ensuring it gets delivered to the right analyst, at the right time. A topic that wasn’t discussed as much, but continues to play a vital role in the federal IT landscape, is big data. I’d like to share some insights on where DHS and DOJ are looking to expand their big data capabilities, based on the sessions I attended.

Read more of this post

Cyber Attacks an Inconvenient Truth – Now What?

Lloyd McCoy_65x85by Lloyd McCoy Jr., Consultant

The Cyber Attacks an Inconvenient Truthtime-honored debate over cyber information sharing has picked-up steam in the last few months, with recent high-profile attacks on companies and government agencies, including: Sony, Target, Home Depot, OPM, and DOD  (just to name a few). Congress and the President are renewing calls to improve, or create from scratch, ways industry and government can work together to limit these threats. The consensus is: effective and damaging hacks are the new normal. Where there hasn’t been agreement is what to do about it.  Efforts from lawmakers suggest some form of legislation could be in the works.

The next few weeks we will see hearings and debate over several legislative bills, from both sides of the fence, all aimed at enhancing information sharing between industry and government.  Both the resurrected Cyber Intelligence Sharing and Protection Act (CISPA) and the Cybersecurity Information Sharing Act (CISA) bills would enable information sharing while offering liability protection. An upcoming bill from the Senate Homeland Security Committee would make the Department of Homeland Security the broker for information sharing, an expansion of the work it is already doing with commercial critical infrastructure providers.

Read more of this post

Follow

Get every new post delivered to your Inbox.

Join 815 other followers

%d bloggers like this: