Update on topic and writer for upcoming FCW feature.
May 10 Reinventing the Enterprise II – Network
IT now touches nearly every aspect of government operations, in uses that will only expand and deepen in the coming years with more social networking, information sharing, and Web-based applications such as cloud computing. Yet the identity management methods that control network access to these dozens and even hundreds of applications and systems are typically handled as discrete, one-off operations. Such a stovepiped approach is extremely inefficient to develop and maintain, inconvenient for users, impedes data sharing and collaboration, and increases security risks. This primer will help executives understand the costs of fragmented identity management and how to make the business case for investments to create and participate in a more integrated, governmentwide system.
Writer: John Moore, jmwriter AT twcny DOT rr DOT com
NEXT STORY: Defense CIO nominee will face tough challenges