3 Areas States and Localities Need Help With the Election

Rachel Eckertelectronicvoting_092216By Rachel Eckert, SLED Consultant

The presidential election is Nov. 8, giving states and localities less than 50 days to get their voting machines ready. The preparations are not quite as mundane and routine as in previous elections, however, as reports circulate that the machines are susceptible to hacking. States are taking steps to ensure that votes cast this election are accounted for and protected.

The problem has been with electronic voting machines. They can be easy to hack and if they don’t leave a paper trail as votes are cast, then there can be significant problems.

Read more of this post

Big IT Opportunities at Small Defense Agency

dsstechday

Defense Security Service’s Second Annual Technology Industry Day.

mark-wisinger_65x85The Defense Security Service (DSS) is a small agency with a big job—the Quantico-based Department of Defense organization provides the military services, defense agencies, 30 federal agencies, and 13,500 cleared contract facilities with security support services.

It’s also an agency with a significant need for technology. At its second annual Technology Industry Day earlier this month, DSS chief information officer, Craig Kaucher (pictured, red tie), cited four key mission areas: industrial security, education and training, insider threat, and IT support.

Here are other takeaways from the event:

Read more of this post

What You Need to Know About GSA’s New Cyber SINs

Steve Headshot 65 x 85gsasins_091416By Steve Charles, immixGroup Co-founder

If you’re a top-tier cyber-services firm in the federal market, the General Services Administration’s new cyber Special Item Numbers (SIN) within IT Schedule 70 are for you.

Adding cyber-related services to your schedule contract under these new SINs will be different. GSA, with technical people from the Department of Homeland Security (DHS), will put your company through an oral cyber-scenario evaluation for each SIN:

  • Penetration testing (132-45A)
  • Incident response (132-45B)
  • Cyber hunt (132-45C)
  • Risk and vulnerability assessment (132-45D)

Read more of this post

Why Perfection is Now Key on CDM

Jenni Taylor_65x85cdmupdate_blog091216By Jenni Taylor, Contract Programs Manager

A significant, if not major, change is underfoot at the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program.

It involves “Attachment R,” which CDM contractors submit when adding a new product or capability to the program. Items are added all the time as CDM moves from phase to phase and from requirement to requirement. If the government found errors in Attachment R, the contractor was able to make corrections, resubmit, and have their capability reconsidered.

No more. DHS sent out notice last week alerting contractors that “Revised Attachment R” is being removed from the open season process. What this means is vendors will no longer be able to correct an Attachment R once it’s been submitted to DHS for review.

Read more of this post

New IoT Security Principles On the Way

Tom O'Keefeiot-security_blog090816By Tomas O’Keefe, Consultant

If you want to look for a growing area of investment in federal IT, look no further than securing the Internet of Things (IoT).

There’s been a lot of recent talk about the IoT, with one of the latest conversation led by the National Institute of Standards and Technology (NIST) at an August 31st workshop to help industry get a grasp on the roadmap the federal government is pursuing in the coming year. IoT leaders across federal agencies will outline strategic principles that will guide near-and-long term purchasing decisions in securing internet-connected devices.

Read more of this post

The Genesis of a New Military Health System

Lloyd McCoy Jr.DHITSConf_090616By Lloyd McCoy Jr., DOD Manager

One of the biggest IT projects in all of the Department of Defense (DOD) is the upcoming MHS Genesis, the military’s new electronic health record – set to go live in early December.

MHS stands for the Military Health System, which is comprised of the Program Executive Office for Defense Healthcare Management Systems, the Defense Health Agency, and the individual medical commands that fall under the service branches.

While much attention and focus will understandably be on the rollout of MHS Genesis in the coming months, there are other pockets of IT initiatives within MHS that will shape defense health IT for years to come.

Read more of this post

Business and Operations Opportunity at DeCA

mark-wisinger_65x85DeCA BizOpers_083116By Mark Wisinger, Market Intelligence Analyst

The Defense Commissary Agency (DeCA), which operates a chain of grocery stores for military personnel and their families, is quietly scaling its IT organization and footprint, creating an opportunity for vendors in the business and operations market.

The Enterprise Business Solution (EBS), DeCA’s new point-of-sale system, is receiving a funding bump in FY17 for customer relationship management (CRM) and financial information management solutions as the program expands. DeCA’s industry partner is NCR Government, which is the prime contract holder until 2020.

Read more of this post

%d bloggers like this: