Can data save health IT security?

Lloyd McCoy Jr.By Lloyd McCoy, DOD manager

The military’s next battlefield could be moving to a hospital bed.

With the growth of new technologies like the internet of things in health care, the security of health IT systems is becoming more at risk. Another challenge is that medical devices are already several years old by the time they’re in active use in the Military Health System.

So could better use of data and analytics help make these systems more secure?

The military health system has a wealth of data and health IT professionals need to harness it to create business and medical intelligence. We don’t need systems to tell us what already happened, but to predict how to best use and position our medical resources to cater to service members and their families.

Read more of this post

Here’s when you should be talking to your SLED customers

Rachel EckertSLED, procurement, sales, public sectorBy Rachel Eckert, consultant

The new state, local, and education (SLED) fiscal year kicked off July 1 for most of the market, and with that governments began a new budget (assuming of course that the legislature passed it). A new budget means fresh money and hope for many in the IT industry about new opportunities.

If you’ve worked in the public sector, be that federal or SLED, you know that nothing in government is immediate. Turning opportunities into deals takes time and careful planning. Also, having an understanding of the government’s planning cycle can help ensure that you’re approaching decision makers with proposals at the right time.

Here is a rundown of their planning cycle and what your actions should be during each quarter:

Read more of this post

What is a prime and a sub?

Chris WiedemannWhat is a prime and a sub?By Chris Wiedemann, consultant

So far in our “What is…?” series, we’ve covered some of the basics of selling commercial items to the federal government, and with good reason – at immixGroup, our suppliers and partners are in the commercial business, and we care about the way our customers buy our products.

However, if you dig into the numbers, you’ll see that the bulk of the federal government’s annual IT spending doesn’t go to buying standalone commercial products. Instead, the bulk of IT contracting is done for services – in other words, paying companies to do things like staff federal data centers; provide hosting and infrastructure management; or develop, engineer and manage complex solutions and mission systems.

Read more of this post

The latest on the Social Security Administration’s IT needs

business and operations, infrastructure, social security administrationBy Kevin Shaker, senior analyst

Finding backend technology opportunities in the government has been tricky in recent years as agencies continue to push their environments toward shared services and Internet-as-a-Service.

However, the Social Security Administration (SSA) is one of the few civilian agencies that’s a viable target in the upcoming fiscal year for companies that offer infrastructure and infrastructure support technologies.

Read more of this post

A continuing resolution is inevitable. Here’s what you need to do

continuing resolution, install base, federal government, budgetBy Stephanie Meloni, consultant

There’s a strong possibility of beginning FY18 under a continuing resolution (CR), so technology companies doing business in the public sector need to be aware of how this will impact sales. Since a CR keeps the government funded at the previous year’s budget, this will mean no new program starts or capital expenditures. The government is basically funding itself to keep the lights on and performing last year’s mission.

CRs have become more and more common in recent years, however, the next CR we face may be longer than most, as experts say it may need to extend into December.

Read more of this post

When will CYBERCOM Split from NSA?

As soon as Congress passed the FY17 National Defense Authorization Act (NDAA), the clock began to tick on CYBERCOM’s elevation to a fully-fledged combatant command.

The NDAA included a clause that mandated CYBERCOM’s elevation to full COCOM status, although there are a few provisions that give us a clue as to when that may occur. Before CYBERCOM can be formally split from Strategic Command, it must reach full operating capability and Congress must approve of CYBERCOM’s readiness.

So what does that mean for the IT industry? With CYBERCOM’s rising and sizeable budget, there’s a lot of opportunity for cybersecurity vendors. But first it’s important to understand what needs to happen for CYBERCOM to split from STRATCOM.

Read more of this post

Government’s answer to cybersecurity is the most simple and most complicated

Lloyd McCoy Jr.cybersecurity, information sharingBy Lloyd McCoy, DOD manager

The key to tackling cybersecurity threats in government is a simple lesson most of us learned in preschool: how to share.

Information sharing among federal departments could be the answer to combating cyberattacks. But the big question is whether the Department of Defense and other agencies can share enough.

Read more of this post

%d bloggers like this: