Everything you need to know about Army’s cyber strategy

Stephanie Melonicybersecurity, DOD, ArmyWith more than $8 billion requested in cyber-specific funding across the Department of Defense for FY19, cyber is top of mind for DOD leadership. It’s no secret the Army has struggled with protecting and strengthening its networks, and there are numerous modernization programs in the works that fall outside of higher-profile items like WIN-T for the tactical network.

One overarching program that will be vital to the Army’s cyber operations will Defensive Cyber Operations (DCO). This is a relatively new office that was stood up in early 2017 at the Army’s Program Executive Office for Enterprise Information Systems (PEO EIS).

Read more of this post

Could regulation be the best thing for IoT?

Lloyd McCoy Jr.cybersecurity, IoTBy Lloyd McCoy, Market Intelligence manager

A new year inspires a fresh look at various issues facing the IT industry and one of them is how the Internet of Things devices should be regulated.

There have been several relevant bills on the Hill since summer, but a recently introduced bill addresses perceived vulnerabilities in the security of IoT devices sold to the federal government. It also addresses the security of medical devices that connect to the Internet. IoT device manufacturers would also have responsibilities to ensure security over the life of the devices.

The counter-argument to this legislation is that disclosure and certification requirements could create additional liability for device manufacturers.

Read more of this post

Cloud opportunities to pursue right now at CBP

cloud, IT, migrationBy Kevin Shaker, senior analyst

In recent years, cloud services and cloud migration opportunities have become a large IT push for agencies that want to lower their hardware costs and hire more skilled workers across the civilian landscape. Larger agencies by nature take longer to meet cloud progress milestones due to their robust infrastructure and trickier siloed mission systems and applications.

One civilian agency starting its cloud journey is within the Department of Homeland Security, the largest funded sub-agency. U.S. Customs and Border Protection wants to push a large portion of its IT to the cloud.

On February 28, CBP released an RFI that asks for help migrating its applications out of its Office of Information Technology’s National Data Center in Springfield, Va., to cloud services. The RFI submissions are due by April 16, which means there is still time to get involved if you have cloud implementation technology.

Read more of this post

What is Exhibit 53?

What is a prime and a sub?Chris WiedemannBy Chris Wiedemann, consultant

As I’ve hopefully conveyed over the course of this “What is…?” series of blog posts, selling to the federal government is a complicated and involved process. It’s been compared to doing business in a different country, and in many ways, that’s an apt comparison. There are enough differences in rules, language and requirements that you can’t just bring commercial sales tactics to bear and expect to be successful.

However, there are some instances where those different rules work in our favor. For example, because the government primarily spends money that is appropriated from taxes, it’s required to show how it’s being used. Which brings us to agency IT Portfolios, formerly (and still informally) known as the Exhibit 53.

Read more of this post

Cloud ramps up at DOD—Here’s what you need to know

cloud, DODBy Stephanie Meloni, consultant, and Mark Wisinger, senior analyst

The Department of Defense is committed to speeding up cloud adoption in 2018 and beyond, and many DOD agencies are exploring their own capabilities and plans as they embark on their journey to the commercial cloud.

But with so many moving parts, it’s hard to follow how cloud will actually take shape at the department. We recently peeled back the layers of DOD’s cloud strategy in a webinar so that companies know how to talk to their defense clients about their biggest challenges and potential solutions.

Here’s a preview of what we covered in the webinar:

Read more of this post

Can data be protected through shared services?

Lloyd McCoy Jr.

By Lloyd McCoy, DOD manager

Any guesses on how much data is generated every year by government and government-related apps? More than 1,000 billion bytes. It’s a staggering number.

Naturally you wonder how is all of that data protected? How do we protect the information that makes our electric grid, air traffic, voting processes and other government-controlled functions keep working safely and reliably?

One obvious answer is to improve the way services are shared between government agencies – and between government and private industry.

Read more of this post

5 ways you can improve your sales skills right now

By ReLita Clarke, learning and development manager

I’ve spent nearly 13 years designing training plans for sales teams and one of the most frequent questions I get is, “Are good salespeople just born to sell or are good salespeople created over time?”

I firmly believe good salespeople are created over time. There’s a natural personality trait in salespeople where they enjoy interacting with and meeting new people and they have a natural tendency to compete.  But to really hone your sales skills takes a lot of trial and error and being able to change course after facing a challenge. It takes time to be good and it’s not something you can automatically jump into.

In my time as a trainer, I’ve given lots of advice to salespeople and the managers who lead teams and here are a few of my top recommendations:

Read more of this post

%d bloggers like this: