Work in Progress: Upcoming FCW features
This story will look at how technology such as geospatial information systems are being used to support urban and regional mass evacuation plans. The report will highlight successful strategies for coordinating different levels of government and jurisdictions, involving key private sector partners and integrating technology into the efforts.Tight budgets that require agencies to do more with less. A push towards e-government built upon increasingly complex IT projects. More and more government activities outsourced to commercial contractors. These trends are making program management one of the most important and most difficult jobs in the government. How is government responding to these historic changes? What strategies are working and which are not?A growing number of government agencies are exploring the use of mashups – independent, Web-based software application and database components that are coordinated into a single, useful application. This story will explain how mashups work, who’s using them, and tips for getting started. A presidential order earlier this year launched the National Cybersecurity Initiative. Public information about the initiative is still extremely limited, but the program is expected to involve significant changes to how the government operates and monitors the security for its data networks. These changes, and the cost and secrecy surrounding the program, have raised concerns in some quarters. What will this initiative mean for agencies across government and the way they manage their cybersecurity defenses? And is the program the most effective way to address the growing threats from state-based and independent online attackers?Social media, blogs, podcasts, wikis and other Web 2.0 interactive tools allow government to work and connect with citizens and other partners in powerful new ways. But do these tools expose agencies to new security vulnerabilities? Learn how some pioneering agencies have assessed and addressed the security issues associated with these new applications. Cybersecurity is a linchpin of modern government operations, yet it is also one of the most challenging areas in terms of technology complexity, policy compliance and staff expertise and management. These factors explain why there is growing government interest in tapping outside expertise in the form of managed security services. This story will identify those cybersecurity systems, operations and related procedures that can be outsourced most successfully. It will also provide tips for selecting providers and managing contractor performance.
Sept. 8: 360-degree Report: Emergency Management
Writer: Ben Bain (bbain AT 1105govinfo DOT com)
Sept. 15: Program Management
Writer: Alan Joch (ajoch AT worldpath DOT net)
Sept. 15: Exec-Tech – Mashups
Writer: John Moore (jmwriter AT twcny DOT rr DOT com)
Sept. 22: Security Series Part I
Writer: Brian Robinson (brian AT hullite DOT com)
Sept. 29: Security Series Part II
Writer: John Moore (jmwriter AT twcny DOT rr DOT com)
Oct. 6: Security Series Part III
Writer: Douglas Beizer (dbeizer AT1105govinfo DOT com)
Writer: Ben Bain (bbain AT 1105govinfo DOT com)
Sept. 15: Program Management
Writer: Alan Joch (ajoch AT worldpath DOT net)
Sept. 15: Exec-Tech – Mashups
Writer: John Moore (jmwriter AT twcny DOT rr DOT com)
Sept. 22: Security Series Part I
Writer: Brian Robinson (brian AT hullite DOT com)
Sept. 29: Security Series Part II
Writer: John Moore (jmwriter AT twcny DOT rr DOT com)
Oct. 6: Security Series Part III
Writer: Douglas Beizer (dbeizer AT1105govinfo DOT com)