In little noticed "common baseline" documents, two large, federated agencies with law enforcement duties show how they will implement new IT procurement rules.
To realize the benefits of shared services, IT leaders must develop a migration strategy that informs participants of their responsibilities and determines the steps involved.
The dialogue between Terry Halvorsen and his advisers on how much control of IT services they want to cede to the military branches and how much they want to retain continues to this day.
KeyPoint Government Solutions, which intruders used to hack the Office of Personnel Management, lacked a formal incident response plan and controls on unauthorized devices, according to the agency's IG.
Agencies are able to put business value on their IT operations, but without younger tech experts, that might not mean much.
As the deadline looms for contract proposal submission for its huge telecom contract, GSA looks towards transition
OPM IG Patrick McFarland said in a memo to Beth Cobert that under the Federal Vacancies Reform Act, "any actions taken by you since the date of your nomination are void and may not be subsequently ratified."
The keys to the law's success are identifying and mitigating the risks to its implementation, especially in light of the upcoming presidential transition.
Deputy Secretary of State, Antony Blinken, announced a changes at the Bureau of Counterterrorism and Countering Violent Extremism to combat terrorism online and work with tech firms.
Consulates and embassies are expected to be able to restore connectivity in the event of disruptive events, but the IG found a range of issues with 20 of the 29 posts it reviewed.
A proposed rule would require firms undertaking government-reimbursed independent R&D efforts to tell defense officials before doing so, and to share the results of those investments afterward.
Add two key federal contracting lawsuits to the long list of issues that could be complicated by the death of Justice Antonin Scalia.