Security, funds occupy CIOs' minds

TechAmerica’s annual federal CIO survey usually does a good job of identifying what’s on the minds of federal IT professionals. The latest survey, released earlier this month, finds the IT community worried about costs as budgets dwindle and concerned about cybersecurity as threats grow.

“I was pleased that cybersecurity was listed first, and not budget,” on the ranking of priorities, said Teri Takai, CIO at the Defense Department, in a panel discussion at a TechAmerica conference associated with the report. “At DOD, cybersecurity is the No. 1 priority.”

DOD is transitioning away from protecting systems at the perimeter and moving toward redesigning systems, moving them to the cloud and managing data differently, Takai said, as quoted in Alice Lipowicz’s article in Federal Computer Week.

The two priorities are intertwined, of course. With less money to spend, investing in cybersecurity becomes more difficult. According to some analysts, the people who control agency purse strings might see cyber threats as remote, almost invisible, until a successful attack belatedly shows its importance.

“IT security isn't easy to pull off, especially when IT and IT security groups don't get the support of their non-tech bosses,” wrote Eric Chabrow in “The Public Eye” blog at “Risk, as the report points out, is a difficult [concept] for most people to grasp, but it is one that is important to convey to users, executives and, in the federal government, to Congress.”

Kenneth Corbin, writing at, pointed out that prioritizing the funds that are available for cybersecurity is important.

He noted that cyber threats include “attacks from outside entities and internal risks, such as lost or stolen laptops, sharing passwords and other lax security practices or employees who shift roles but retain access to sensitive information from their former position. Some respondents pointed to an imbalance that sees the majority of some agencies' cybersecurity resources directed toward external threats, while most serious data breaches are attributed to internal factors.”

Enhancing the 25-point plan

One section of the survey report lists the respondents’ suggestions for improving the Obama administration’s 25-Point Implementation Plan to Reform Federal IT Management. Here are the recommendations.

  • Shift from a policy focus and measure tangible successes instead.
  • Group the plan into key focus areas because it is too hard to do justice to all 25 points.
  • Return to a focus on lines of business as was done before 2009, such as human resources, finance and payroll, which would give a boost to cloud computing and shared-services initiatives.
  • Work closely with the President’s Management Council when doing investment reviews.
  • Encourage government entities to be ruthless in setting priorities, as private companies are.
  • Provide seed money for some initiatives that will generate long-term savings but have short-term costs not tenable in the current budget crunch.
  • At the Office of Management and Budget, develop a better partnership among the federal CIO, chief financial officer and chief procurement officer.
  • Encourage Congress to fund more projects on a two-year basis.
  • Require OMB to do more cost/benefit analyses on implementing the plan.
  • Pick activities that can be done in one year and be ready to regroup because “there will be changes at the top regardless of the political views of the administration.”

About the Author

Technology journalist Michael Hardy is a former FCW editor.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group