What programs have been on GAO's High-Risk List the longest? The farther from the center a program is on this diagram, the longer its tenure. (FCW graphic.)
A: DOD Weapon Systems Acquisition
B: NASA Acquisition Management
C: DOD Contract Management
D: DOD Financial Management
E: DOD Business Systems Modernization
F: Protecting the Federal Government's Information Systems and the Nation's Cyber Critical Infrastructure
G: DOD Support Infrastructure Management
H: Strategic Human Capital Management
I: Strengthening Department of Homeland Security Management Functions
J:Establishing Effective Mechanisms for Sharing and Managing Terrorism-Related Information to Protect the Homeland
K: DOD Approach to Business Transformation
L: Ensuring the Effective Protection of Technologies Critical to U.S. National Security Interests
M: Mitigating Gaps in Weather Satellite Data
About the Author
Connect with the FCW staff on Twitter @FCWnow.
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Steve Kelman considers the costs of corruption in Mexico, China, and most developing countries -- and argues that Americans should keep their own government troubles in perspective.
Agency leaders must proactively invest time, energy and resources to shape the future rather than reactively wait for change to happen.
Meet 24 men and women who are driving key changes in federal IT -- and shaping up as the community's likely leaders of tomorrow.
GSA's administrator talks with FCW about short-term hiring, long-term planning and Robert Frost.
Without a future vision and an appetite for risk, reforms lead down a rabbit hole. There is a better way.
VA's top tech official says he is balancing risks while trying to keep the department's online services open for business.
After five years on the job, the founding director of the Office of Government Information Services believes that a deeper understanding and acceptance of FOIA is seeping into the federal government.
The September attack, made public Nov. 10, potentially puts customer and employee personal information at risk, including addresses, Social Security numbers and emails.
The General Services Administration's Matthew Goodrich predicts more agency-driven authorizations and previews a new two-year road map.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com