What programs have been on GAO's High-Risk List the longest? The farther from the center a program is on this diagram, the longer its tenure. (FCW graphic.)
A: DOD Weapon Systems Acquisition
B: NASA Acquisition Management
C: DOD Contract Management
D: DOD Financial Management
E: DOD Business Systems Modernization
F: Protecting the Federal Government's Information Systems and the Nation's Cyber Critical Infrastructure
G: DOD Support Infrastructure Management
H: Strategic Human Capital Management
I: Strengthening Department of Homeland Security Management Functions
J:Establishing Effective Mechanisms for Sharing and Managing Terrorism-Related Information to Protect the Homeland
K: DOD Approach to Business Transformation
L: Ensuring the Effective Protection of Technologies Critical to U.S. National Security Interests
M: Mitigating Gaps in Weather Satellite Data
About the Author
Connect with the FCW staff on Twitter @FCWnow.
E-Mail this page
Check out the digital edition of FCW magazine -- the federal IT community's premier publication.
In this issue: Tony Scott's busy year ahead, Rising Star profiles and more.
See the latest issue
DHS pulled a two-year-old solicitation for administrative support for cyber mission offices.
The president put the federal government's portfolio of aging IT systems front and center in his final budget request to Congress.
The Obama administration's proposed Cybersecurity National Action Plan for FY2017 includes $3.1B for IT modernization and a new federal chief information security officer.
Looking for success stories and exceptional change in federal IT? Meet the women and men who are making it happen.
In a new survey, federal leaders say they're making digital progress, but most also say they're merely updating old systems, not reinventing processes for the Digital Age.
The U.S. Customs and Immigration Services created new deputy CIO slot to help balance everyday IT operations and burgeoning DevOps, agile and cloud activities.
NIST is looking to increase trust in the technical underpinnings of encryption, by strengthening cryptographic random bit generators.
Steve Kelman applauds ASI Government for sharing valuable knowledge -- and notes that there are still plenty of other questions to answer.
In an op-ed for Business Insider, the GOP presidential candidate called for "the federal government must put its own house in order, prioritizing to reflect the urgency and importance of protecting key databases and communications."
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com